Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance standards required to protect brand, intellectual property, and revenue.

Read More
Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...

Read More
Six Degrees Group underpins UK public sector's building operations

Converged services provider’s infrastructure used by LHC to support procurement for 150...

Read More
IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK...

Read More
Skilled Data Scientists in demand as job posts grow 1000%, says Rackspace

Rackspace, the managed cloud company, has thrown its weight behind the first ever Science to Data...

Read More
What is the future of cloud computing for SMEs?

Cloud has often been considered the future of enterprise IT but what about the smaller business?...

Read More
Integrated endpoint threat prevention, detection and response

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...

Read More
Alert Logic announces security solutions for Google Cloud Platform

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More
Consumer confusion around Cloud technology

U.K. research released by Juniper Networks reveals that nearly one quarter of respondents (21.8...

Read More
The European General Data Protection Regulation – a major opportunity for cloud providers

New AIIM whitepaper highlights the potential to deliver EU-wide services under a single operations...

Read More
OpenStack Summit heads to Europe

For the first time, the OpenStack® Summit is coming to Europe. The 10th OpenStack Summit will...

Read More
375 million customer data records compromised in 2014

Identity theft main reason for breaches and survey shows 40 per cent of consumers very unlikely to...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Rollo Maschietto, Policy Manager, Renewable Energy Association (REA), discusses the ways in which the data centre and energy sectors can work together to ensure delivery of the clean, reliable, and scalable...

Expert Opinions

By Prasad Sankaran, President, Software and Platform Engineering at Cognizant.
Jamie Akhtar, CEO and Co-Founder of CyberSmart
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...