vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by giving enterprises and service providers visibility, control and threat defences for the agile data centre.

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More
Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More
How to beat the top vulnerabilities

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More
Very small businesses eager for mobile technology but lack security

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device...

Read More
ManageEngine enhances identity and access management portfolio

ManageEngine, the real-time IT management company, has announced enhancements across its identity...

Read More
Leading IT security technology 8MAN takes Europe ‘by storm’

Software distributor Prianto supports the plans for internationalisation made by Berlin-based...

Read More

Videos

Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Prakash Govindan, Gradiant’s co-founder and COO, discusses the challenges facing both the data centre and semiconductor industries when it comes to water usage. The company is currently working with two data...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...

Expert Opinions

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
By Stuart Farmer, Sales Director at Mercury Power.
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By François Haykal, Senior Project Consultant at BCS, the specialist services provider to the digital infrastructure industry.