Four in five IT managers unaware of upcoming regulation

Three out of five (61 per cent) IT managers admit that their organisations have not taken measures to be GDPR compliant.

Read More
Netskope takes cloud app visibility to ‘new level’

Netskope increases breadth of deployment options, making it the most flexible and comprehensive solution in the market.

Read More
CipherCloud achieves FIPS 140-2 Validation

FIPS 140-2 compliance assures companies and government agencies that CipherCloud’s products meet the highest levels of security for protecting sensitive data in the cloud.

Read More
Good Technology accelerates secure BYOD

Good Technology has announced the availability of Good Work™, a ‘simple, easy-to-deploy’, cloud-hosted or on-premise secure enterprise mobility management (EMM) solution for businesses of all sizes, accelerating entire deployments and enabling users with secure mobile productivity...

Read More
WatchGuard warns IT pros against applying ‘One Security Policy to All’

New WatchGuard Firebox M440 UTM/NGFW makes it easy to apply the right policies to the correct...

Read More
Sophos research reveals attitudes and understanding of data protection across Europe

77 per cent of respondents not confident their organisation complies with data protection...

Read More
Integrated infrastructure and platform revenue grows 51%

The integrated infrastructure and platforms market in Europe, the Middle East, and Africa (EMEA)...

Read More
Alert Logic introduces ActiveWatch for Alert Logic Log Manager

Alert Logic has announced the availability of Alert Logic ActiveWatch for Log Manager, a managed...

Read More
Understanding data compliance

By Campbell Williams, group strategy and marketing director, Six Degrees Group.

Read More
Cryptography advisory board receives a boost

Board will provide expert oversight of encryption schemes for advanced cloud security, and deliver...

Read More
vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by...

Read More
The reality of rising DDoS attacks

Almost a quarter of European companies (23 per cent) consider DDoS (Distributed-Denial-of-Service)...

Read More
State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even...

Read More
‘Revolutionising’ SAP security

Onapsis has released the Onapsis Security Platform (OSP), featuring two software-based solutions...

Read More
Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More

Videos

Matt Wilkins, Global Director of Design and Engineering at Colt DCS, explains that data centre operators need ‘controlled flexibility’ now more than ever, as tightened regulatory environments, skills gaps,...
As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Keith Norman, Chief Marketing & Sustainability Officer of Lyten, explains the reasons behind the company’s acquisition of Northvolt’s battery assets in Sweden, with the site expected to resume operations...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Stewart Hunwick, Field CTO, Storage Platforms and Solutions, Dell Technologies.
At Atlassian Team '26 in Anaheim, industry leaders gathered to explore the next phase of AI, where context-aware systems and platform enhancements are set to redefine how work is automated and scaled across...
By Paul Inglis, Senior Vice President and General Manager at Ping Identity.