NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys, joining forces will help them fight to win. Having access to the latest information from peers and subject matter experts will typically help all organisations, large or small, deal with any threat...

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for...

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...

Read More

Videos

Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Welcome to the WinStar Introductory Presentation!
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...

News

AI is no longer a sidekick but a central player in revenue decision-making, redefining productivity and growth across global sales teams.
Infinum acquires UK-based AMR CyberSecurity to bolster its cybersecurity offerings amid rising threats.
Vantage Data Centers announces the completion of its fourth facility, KUL14, in Malaysia, marking a significant milestone in sustainable hyperscale data center development.
Qlik announces its collaboration with AWS, enhancing data sovereignty and security for European entities.