DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Bit9 and Carbon Black merge

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...

Read More
Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...

Read More
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...

Read More
Security concerns holding back data centre consolidation and Cloud migration

Security concerns are preventing businesses from unlocking the potential benefits of data centre...

Read More
Driven by end-user digital demand, Capgemini consolidates digital expertise in new global service line

Consolidation of three year industry research program with MIT Center for Digital Business and...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More

Videos

Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Paul Christensen, Macquarie Data Centres General Manager, discusses the company’s 47MW IC3 Super West Sydney AI data centre, in the context of its plans to build out some 200MW of AI and cloud capacity in...
Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
Phil Cullerton, VP Services EMEA at Vertiv, explains why services will define the future of the data centre. The future of the data centre is not just about who builds fastest, it is about who operates best....

Expert Opinions

By Rick Vanover, Vice President, Product Strategy at Veeam.
Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...
By Alistair Barnes, Head of Mechanical Engineering at Colt DCS.
Harmonics pose a headache for electrical systems in many industries, but data centres are uniquely exposed to the risks. Scott Birchall, Data centres & HVACR application engineer, ABB, explains what harmonics...