Gartner says beware of the data lake fallacy

The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner, Inc. Several vendors are marketing data lakes as an essential component to capitalise on Big Data opportunities, but there is little alignment between vendors about...

Read More
Firemon and Tripwire partner

FireMon and Tripwire, Inc. have announced the integration of Tripwire IP360 and FireMon Security Manager with Risk Analyzer.

Read More
Skyhigh Networks and SafeNet team up

Skyhigh Networks has announced a collaboration with SafeNet to deliver flexible and secure key management solutions to protect corporate data in the cloud. By working together, Skyhigh Networks and SafeNet enable enterprises to leverage on-premise or cloud-based models for encrypting data while...

Read More
Cloud Resources: The scary truth about portable enterprise data

By Tony Craythorne, VP of Worldwide Business Development, Quorum.

Read More
Tech boss pledges £1m to keep businesses safe online

UKFast founder follows up 2013 fund with fresh investment in web safety.

Read More
FireEye and Quantum team

New partnership enables enterprises to easily conduct cybersecurity investigations and improve...

Read More
telent boosts cyber security with major investment in CNS Group

telent Technology Services Ltd has increased its IT security capability by acquiring a 25% stake in...

Read More
US$1 trillion to be spent on telecom and datacom over next five years

Market research firm Infonetics Research released data from its 2014 Telecom and Datacom Network...

Read More
Poor password management leaves service accounts open to attack

Survey reveals security professionals don’t practice what they preach when it comes to...

Read More
ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations...

Read More
At least one in three ex-employees left with access to systems or data post termination

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access...

Read More
MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More
IT budgets and hiring stabilise in 2014

Complexity expected to grow in 2015 as IT budgets rise while IT departments feel a hiring squeeze.

Read More
Kemp introduces load balancers with native WAF

Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Paul Speciale, Chief Marketing Officer at Scality.
By Samantha Jennings, Head of Operations, Avella.
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.