Securing your IT Security career

Philip Lieberman of Lieberman Software, shares his tips to looking good and getting promoted in today's competitive, cutting-edge world of IT security.

Read More
Virtualisation and consolidation are priorities

An independent market research survey commissioned by Riverbed Technology, the application performance company, reveals that 70 percent of IT decision makers are looking to centralise applications during 2013. The Riverbed® commissioned survey questioned 400 CIOs in Europe and the Middle East...

Read More
‘First ever’ on demand e-learning and multi-course curriculum for OpenStack

Rackspace® Hosting has added four new classroom-based courses and established a training partner programme to expand its industry leading Rackspace Training for OpenStack programme. The programme is a multi-course curriculum designed to expand worldwide adoption of OpenStack technology.

Read More
Zscaler announces Cloud-based APT solution

Zscaler has announced Zscaler for APTs, said to be the industry’s first cloud-based security...

Read More
IT security and risk managers divided over role of compliance within customer contact operations

Sabio interviews reveal organisations still struggling to find the right balance between ensuring...

Read More
Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...

Read More
Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the...

Read More
Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial...

Read More
HP bringt Next-Generation Firewall

- Neue Firewall von HP TippingPoint inspiziert bis zu zehn Gigabit Daten pro Sekunde - Neue...

Read More
F5 Networks erwirbt Versafe und unterstützt so seine Kunden beim Schutz vor Online-Betrug

F5 Networks gab die Übernahme der Versafe Ltd. bekannt. Mit der Übernahme erweitert...

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...

Read More
GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

Expert Opinions

Andrew Winters, executive vice president- managed detection and response from Obrela discusses the telecoms industry’s distinctive cyber threat profile
By Jon Healy, Regional Strategic Operations Officer at Salute.