NEWS
Employees accessing cloud-based applications and data via mobile devices

Zscaler report provides insights into user behaviour and the challenges with mobility and remote access in the face of cloud transformation.

Read More
NEWS
Historic vulnerabilities and network complexity pose ongoing security risks

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business. The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched...

Read More
NEWS
84% of UK CIOs and CISOs hold back from making critical updates to keep the business running

Latest Tanium research highlights the IT security and operational trade-offs that UK CIOs and CISOs face in protecting their business from disruption.

Read More
NEWS
Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident...

Read More
NEWS
Privacy concerns grow

Nearly three out of four Brits are more alarmed than ever about their privacy, but many are willing...

Read More
NEWS
Financial institutions fail to protect mobile apps

Research highlights a systemic failure to protect financial services apps against multiple...

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...

Read More
NEWS
87 percent of security professionals say world is at cyberwar

Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.

Read More
NEWS
Bromium endpoint protection and threat intelligence sharing strengthen HP Device as a Service Proactive Security offering

Real-time threat isolation protects against malware introduced through email, browsers and files,...

Read More
NEWS
Identify3D deploys Gemalto solution

Digital manufacturing software provider expands its data security with SafeNet Data Protection on...

Read More
NEWS
Malicious intent outweighs technology as biggest threat to personal data

Apricorn, manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB storage devices,...

Read More

Videos

Tony Kelly, Director of Alliances, EMEA at Fivetran, explains what Fivetran’s enhanced partner programme means – higher incentives via the four partner tiers, deeper go to market collaboration and expanded...
Ed Bissell, Sales & Marketing Director, Stellium Datacenters, discusses an Open Compute Project (OCP) Proof of Concept at its HPC hyperscale data centre near Newcastle. This follows the integration phase of an...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Zeki Turedi, Field CTO, EMEA, CrowdStrike.
By Steve Prescott-Jones, director of managed services at UBDS Digital.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
AI is revolutionising work in the unified communications sector, but with its transformative potential also come challenges; William Rubio, CallTower’s CRO explores the key areas where AI is making an...