Insurance Giant Allianz partners with Incoming Thought

Cyber crime and data breaches are considered one of the top emerging risks for the 21st century and companies need to act now to protect their assets.

Read More
China Comservice selects Wontok

China Comservice, a leading provider of information and communication technology services in the People's Republic of China, has selected Wontok's cloud and endpoint security solutions to protect its consumer and enterprise customers. Comservice is reinforcing its existing security offering...

Read More
Employees causing security threats

Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of respondents also admitted to uploading confidential data to their personal cloud accounts. The severity of this threat to their...

Read More
ICO carries resolution encouraging greater co-ordination of global data protection enforcement

The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to see improved co-ordination between global data protection and privacy authorities.

Read More
Wave Cloud 2014 debuts

Industry’s only cloud service for self-encrypting drive (SED) management can now handle the...

Read More
Outsourcery to launch new high security IL3 compliant cloud services for UK government

Outsourcery plc is taking part in Microsoft Corporation’s initiative to accelerate the...

Read More
UK companies getting better at cyber security

The number of security incidents detected by UK companies in the past 12 months is almost three...

Read More
Zscaler announces Cloud-based APT solution

Zscaler has announced Zscaler for APTs, said to be the industry’s first cloud-based security...

Read More
IT security and risk managers divided over role of compliance within customer contact operations

Sabio interviews reveal organisations still struggling to find the right balance between ensuring...

Read More
Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...

Read More
Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the...

Read More
Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial...

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...

Read More

Videos

Alex Hoff, Co-Founder and Chief Strategy Officer at Auvik, discusses the results of the company’s recent IT Trends 2024 Industry Report, which explains how the ongoing skills shortage is shaping IT...
Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...
David Williams, Acting Managing Director EMEA, Telstra International, and Kwee Chuan Yeo, Senior Editor, Asia, MIT Technology Review Insights, discuss the findings of a recent MITTR study focusing on AI. It...

Expert Opinions

By Gregg Ostrowski, CTO Advisor, Cisco Observability.
By Dael Williamson, EMEA CTO at Databricks.
By Erik Scoralick, Senior Manager, Sales Engineering at Forcepoint.
By Scott Walker, CSIRT Manager, Orange Cyberdefense.