NEWS
Shadow IT continues to give cause for concern

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating the level of shadow IT in their cloud ecosystems. CipherCloud has unveiled the results of the industry’s first comprehensive study of cloud usage and risks from 2014, compiled from enterprise...

Read More
Cyber threat portal

Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and resolution of cyber threats. It improves the accuracy of decisions, optimises the diagnosis of the nature of attacks, enhances the efficiency of security operations teams and reduces the time at risk...

Read More
NEWS
Herjavec Group expands Into Europe

Herjavec Group has acquired Sysec™, an IT security solutions provider headquartered in the United Kingdom and the 2014 McAfee EMEA Accredited Certified Engineer (ACE) Partner of the Year. 

Read More
NEWS
Automating access management, a tops among 2015’s IT trends

By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...

Read More
Organisations report better security policy implementation, improved technologies and growing financial commitment

With every email now a target and every piece of data at risk, the need for data protection...

Read More
EXIN expands its security portfolio

EXIN Holding BV and Security Academy BV are very pleased to strengthen their partnership in the...

Read More
Clavister launches entry-level W20 firewall

Latest addition to the Clavister Wolf Series products complements Clavister W3 and Clavister W5...

Read More
MicroStrategy unveils powerful new platforms for enterprise analytics, enterprise mobility, and enterprise security

MicroStrategy® Incorporated has announced the availability of MicroStrategy 9s, bringing...

Read More
A single DDoS attack can cost a company more than $400,000

According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS attack...

Read More
2015 Tech M&A on a path to continue record-setting spending of 2014

M&A Outlook Report cites bullish sentiment from bankers and acquirers among the factors that...

Read More
Arbor Networks 10th Annual Worldwide Infrastructure Security Report finds 50X increase in DDoS attack size in past decade

Size, complexity and frequency of attacks continue to rise, customer infrastructure and data...

Read More
Proofpoint Security Suite innovations provide lifecycle defence against advanced threats

Advancements block more threats, detect new threats faster, automate response and reduce...

Read More
Critical infrastructure executives complacent about Internet of Things security

24 percent of critical infrastructure employees have already connected an Internet of Things device...

Read More
Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to...

Read More

Videos

Nicolas Leszczynski, Principal Solution Engineer at Riverbed, discusses the results of the recent Riverbed Global AI & Digital Experience Survey, which finds that organisations are at an inflection point as...
Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...
Kenneth Tan, Executive Director at Sardina Systems, Philip Kaye, Co-Founder and Director at Vespertec and Kristófer Andri Kristinsson, Product Manager and Business Development Manager at Borealis Data Center,...
News and views from the recent DCA-organised Data Centre Transformation 2024 event.

Expert Opinions

Anita Mavridis, VP of Product at Zivver, and Sue Musumeci, Director of Quality & Clinical Informatics at Chronic Care Staffing, explore practical strategies for empowering employees.
By Jason Beckett, Head of Technical Sales, Hitachi Vantara.
With data centres now deemed as critical infrastructure, organisations must evolve beyond traditional security to combat sophisticated cyber threats. By Jon Mort, CTO, The Adaptavist Group,