NEWS
When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free...

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more...

Read More
NEWS
Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer...

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the...

Read More
NEWS
Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the...

Read More
NEWS
Indecent exposure: could Wi-Fi be your weakest link?

Greig Schofield, Technical Manager at Netmetix, explores how Wi-Fi could expose your business –...

Read More
NEWS
Top Ten Cybersecurity Predictions for 2019

By Ian Kilpatrick, EVP Cyber Security, Nuvias Group.

Read More
NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when...

Read More
NEWS
Building security into legacy infrastructure

B y James Sinton, Head of Technology Services, IMS Evolve.

Read More
Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More
Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon...

Read More

Videos

Tal Barmeir, Co-founder & CEO Blinq.io, discusses her career in the IT industry, sharing some valuable insights when it comes to entrepreneurship and start-ups, alongside her belief that equality needs to be...
Sam Bainborough, Director, Strategic Segment Colocation & Hyperscale at Vertiv, discusses recent developments at the company, including expansion plans, liquid cooling, modular timber construction and energy...
Steve Haskew, Head of Sustainability and Social Leadership at Circular Computing, explains how the road to Net Zero almost certainly involves organisations considering their IT estate, especially in terms of...
Jamie Akhtar, Co-Founder and CEO at CyberSmart, discusses the importance of cybersecurity solutions developed specifically for the SME market and the benefits they can bring to both the Channel and end users...

News

Executives and technologists around the world agree to focus on critical fundamentals when it comes to the top technical upskilling needs.
ManagementStudio says that the UK’s largest retail bank has migrated 14,000 desktops from Citrix to Microsoft Azure Virtual Desktop (AVD).
Expansion strategy includes new 400G IP Transit digital infrastructure connecting Frankfurt, London, Amsterdam and Paris.
Xalient has launched MARTINA Predict 2.0, the latest iteration of its advanced AI Ops suite. This latest version introduces a pioneering cross-domain event correlation capability that not only enhances anomaly...