NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate data from more than 450 organizations across the globe that participated in Thycotic’s Q4 2018 PAM Maturity Model assessment survey to-date.

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now possible.

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes...

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and...

Read More
NEWS
Carbonite closes acquisition of Webroot

Transaction combines data backup and recovery technology with cybersecurity platform to deliver...

Read More
NEWS
Beware the backdoor

69% of security professionals believe countries with government mandated encryption backdoors...

Read More
NEWS
Swivel Secure partners with BeSecure IT

Multi-factor authentication provider, Swivel Secure, has announced its new partnership with...

Read More
NEWS
Coleg Cambria chooses LogRhythm’s NextGen SIEM Platform to centralise security operations

LogRhythm’s platform to optimise and simplify security workflows at UK education provider.

Read More
NEWS
Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...

Read More

Videos

In this video, DCS talks to Accelsius at the DCA's 2025 10x10 Event
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...

Expert Opinions

By Erik Costlow, Sr Director, Product Management, Azul.
By Peter Miller, Sales Manager at ETB Technologies.
Adult skills expert, Kevin Vashi at Netcom Training will discuss why in times of crisis, UK businesses should prioritise the onboarding and training of cybersecurity professionals.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.