NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a...

Read More
NEWS
Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...

Read More
NEWS
The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their...

Read More
NEWS
Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...

Read More

Videos

Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
Antoine Jebara, Co-Founder and GM of Channel & Alliances at JumpCloud, explores how managed service providers can move beyond transactional roles to become true business partners. He dives into practical...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

News

Despite security concerns, organisations are advancing with AI deployment, underscoring governance gaps and highlighting rising risks.
HUBER+SUHNER and Aurora Networks collaborate to enhance Vodafone’s cable network with next-gen Remote PHY solutions and Distributed Access Architecture in Germany.
Check Point introduces the AI Defense Plane to safeguard enterprises as AI systems advance to autonomous roles in business.
Johnson Controls is conducting a European tour with a mobile showcase featuring its energy-efficient technologies and solutions.