NEWS
Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More
Free Cloud-based enterprise IoT Vulnerability Scanner

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More
NEWS
Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching...

Read More
NEWS
New year, new risks: 2017’s top cyber threats

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....

Read More
2017 Predictions

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More
????Global Cyber Alliance appoints Troels Oerting as Chairman of the board

The Global Cyber Alliance (GCA), an international, non-profit organization focused on addressing...

Read More
NEWS
Cybersecurity - could do better

Nuix has  released the findings from its third annual survey of corporate information...

Read More
NEWS
Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering...

Read More
Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work...

Read More
Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study...

Read More
NEWS
2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...

Read More
Cyclance launches Channel programme

Building security expert community to deliver AI-based protection.

Read More
NEWS
Security does not equal maturity

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...

Read More
NEWS
Anomali Labs 2017 predictions

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...

Read More

Videos

Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Michael Hunger, VP of Product Innovation, Neo4j.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.