C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
94 percent of IT security professionals using third party apps on their mobiles

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity that are harder for IT to track and manage.

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same...

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more devices become connected and intelligent.

Read More
Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the...

Read More
BT and Exostar to help life sciences organisations collaborate

Scientists engaged in collaborative initiatives can now securely access Transformative Cloud-based...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
Radware delivers its strongest DDoS mitigation capabilities

Radware®has announced the latest version of DefensePro® – a real-time, behavioural...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement,...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the...

Read More
Dell bolsters Bango’s booming business

Leading provider of mobile billing solutions expands to emerging markets with help from new IT...

Read More
Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public,...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
LogRhythm kommentiert: Bank of England: Hacker soll Schwachstellen aufspüren

Die Gefahr ist real: Internetterroristen trainieren großangelegte Angriffe auf die...

Read More

Videos

Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...

Expert Opinions

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
It’s easy to be astonished by how fast AI has progressed. But industry insiders are equally amazed by the pace at which the infrastructure underlying artificial intelligence has developed – and the surge...
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.