Virtustream first with Intel TXT

IaaS provider says it is the first to implement the chipmaker’s Trusted Execution Technology in a cloud management platform

Read More
Gartner looks into RaaS

Recovery as a Service is seen as a category of its own in the latest Gartner research, and one of the contenders it picks, Bluelock, talks about it

Read More
The `cloudy car’ market will be huge

Market research report suggests it could be worth over $98 billion by 2018, and the potential of new applications is limitless, though some could be distractingly bad for drivers.

Read More
Tenable joins AWS

Tenable’s widely used Nessus vulnerability scanner is now available as part of Amazon’s AWS Marketplace

Read More
Amazon pumps support into the AWS partners

Remaining the `big gorilla’ in the world of providing cloud infrastructure means more than...

Read More
Securing clouds, and more, by policy

CloudSigma adds policy-based security to its IaaS offering to provide faster, cheaper and more...

Read More
HyTrust buys HighCloud for maximum strength security

By combining its security admin and control tools with HighCloud’s encryption and key...

Read More
Thales gives Microsoft Azure BYOK

Bring Your Own Key using Thales technology is a security approach that Microsoft is now using to...

Read More
Applying analytics to cloud security

Total Defense says it has put some serious big data analytics steroids into its latest...

Read More
Security against the unknown now comes as a service

Lastine, a three year old security specialist with a longer history in identifying the dangerous...

Read More
Fujitsu Forum – A humble lightbulb shows the good and bad of IoT

Fujitsu CTO, Dr Joseph Reger, used a single, IP address-publishing lightbulb to extrapolate out the...

Read More
Sophos delivers security in the cloud

Possibly one of the ultimate services a small business requires is security, and getting it...

Read More
Be careful with apps using NFC

Anyone developing new applications that use the new contactless debit/credit cards and Near Field...

Read More
Laying policy on BYOD security

The partnership between Forescout and SAP aims to make all user devices subject to policy...

Read More
Carrenza gives Oracle users a DRaaS option

Many Oracle users have a high-resilience environment but no escape route if disaster strikes, so...

Read More

Videos

In this video, DCS talks to Schneider Electric at DCW 2025
In this video, DCS talks to Moteurs Baudouin at DCW 2025
Vivek Behl, Vice President, Strategy at WalkMe, discusses the findings of the company’s annual report, The State of Digital Adoption 2025, Special AI Edition. This year’s report focuses on AI adoption in...
In this video, DCS talks to Procore at DCW 2025.

Expert Opinions

By Jonathan Wright, Director of Products and Operations at GCX.
As a managed service provider (MSP), you probably know the frustration of having great conversations on technical features and technologies you have, only to see potential customers lose interest. Here's the...
2025 will see cybersecurity challenges continuing to evolve, security breaches becoming ever more sophisticated, and organisations accelerating their adoption of SASE and SSE in response.
By Adam Pilton, Senior Cybersecurity Consultant at CyberSmart.