Closing the loop on DevOps

By Elizabeth Lawler, vice president, DevOps security at CyberArk.

Read More
2018 will be the Year of Automation when ‘big, bad attacks’ will target automated technology processes

Carl Herberger, vice president of security solutions at Radware, has made his top three predictions for security in 2018. He concludes, looking at the attack patterns in 2016 and 2017 and the technological developments expected in 2018, it will be the ‘Year of Automation’, or more...

Read More
2018 predictions - from cryptocurrency mining to ‘fileless’ attacks

By Travis Farral, Director of Security Strategy at Anomali.

Read More
Cybersecurity Predictions for 2018

NordVPN offers predictions and advice for 2018.

Read More
NEWS
Four critical steps to secure API keys in your organisation’s cloud workloads

By Chris Smith, Product Marketing – Cloud and MSSP, CyberArk.

Read More
NEWS
Three keys to DDoS defence: monitor, protect, communicate

By Mike Hemes, Regional Director, Western Europe, A10 Networks.

Read More
What makes for meaningful collaboration?

How to protect and secure your business data while successfully employing business...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
DCW Asia 2025 - Part 3 of 3
Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...
DCW Asia 2025 - Part 1 of 3

News

Westcon-Comstor has signed a distribution agreement with Meter to make its networking-as-a-service platform available to partners across EMEA.
Park Place Technologies has released Entuity Software V23.0, adding remote agent architecture, streaming telemetry and configuration management updates to extend infrastructure monitoring across distributed...
Commvault introduces Geo Shield, strengthening data protection and compliance for enterprises through enhanced cloud sovereignty solutions.
New reports indicate growing cyber threats for government sectors, underlining the urgency for integrated cybersecurity measures.