NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More
NEWS
Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior...

Read More
NEWS
Security by design – is it just a pipe dream?

Nigel Thorpe, technical director at SecureAge Technology questions whether security by design will...

Read More
NEWS
Don’t pay the ransom: how to recover from a ransomware attack

Everyone is petrified of ransomware attacks right now, and with good reason. The attacks have...

Read More

Videos

Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Data Centre World Asia 2025
Welcome to the WinStar Introductory Presentation!

News

Over 30% of UK's organisations neglect comprehensive data backups, risking severe disruption from cyber threats, reveals Cohesity. Discover the challenges and solutions highlighted by AI advancements.
Infinum acquires UK-based AMR CyberSecurity to bolster its cybersecurity offerings amid rising threats.
Westcon-Comstor has unveiled a Renewal API with Check Point Software, boosting automation and partner efficiency.
Manufacturing sectors see a shift in ransomware tactics as data theft rises. Defensive measures improve, yet pressure from adversaries persists.