Identity theft accounts for over half of all data breaches

Gemalto has released the findings of the Breach Level Index for the first six months of 2015, revealing that 888 data breaches occurred, compromising 246 million records worldwide.

Read More
IT professionals call for UK to stay in the EU  

UK IT professionals are the latest group to express confidence in the UK’s EU membership, with over two thirds (67%) saying that being a part of the EU gives them greater business confidence, according to new research from IP EXPO Europe, Europe's number one IT event.

Read More
Okta closes $75 million in financing

Okta, the leading identity and mobility management company, has secured $75 million in new...

Read More
IT department revealed as major culprit for maverick spend  

New research suggests IT decision makers like to go it alone when making purchasing decisions.

Read More
Okta opens EU data centre  

Investment in new, local infrastructure signals long-term strategy for customer expansion and...

Read More
WALLIX delivers on security and visibility for cloud computing

WAB On Demand (WOD) is a pay per use solution to provide Privileged Access Management for any cloud...

Read More
Internet of Things Security Foundation set for global launch

A collaborative initiative has been established to respond to rising concerns over security in the...

Read More
Skills uncertainty, not shortages, is the real issue across Europe, says Claranet  

Partnerships are key to establishing business certainty and insulating against skills shortages.

Read More
Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade...

Read More
HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address...

Read More
AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the...

Read More
Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...

Read More
Almost a third of organisations unable to detect intruders on network  

New Lieberman Software study reveals organisations are relying on traditional IT security solutions...

Read More

Videos

Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Chris Derham, Business Development Director – Networks, Alcatel-Lucent Enterprise, discusses the company’s innovative generative AI chatbot, ALIE, which is available on a global scale for use by channel...
Helena Fagraeus Lundström, T.Loop CEO, explains how T.Loop designs, builds and operates Data Energy Centers®, realised “on the edge” in buildings with heating needs that match with Data Energy...
Ed Bissell, Sales & Marketing Director, Stellium Datacenters, discusses an Open Compute Project (OCP) Proof of Concept at its HPC hyperscale data centre near Newcastle. This follows the integration phase of an...

Expert Opinions

By Mike Fry, Infrastructure Data & Security Solutions Director at Logicalis UK&I.
By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.
By Erik Costlow, Sr Director, Product Management, Azul.