NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA)...

Read More
NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for...

Read More

Videos

Leah Goldfarb, Environmental Impact Officer at Platform.sh, explains the importance of being able to identify truly green data centres as organisation’s develop their own sustainability objectives and also...
Alex Hoff, Co-Founder and Chief Strategy Officer at Auvik, discusses the results of the company’s recent IT Trends 2024 Industry Report, which explains how the ongoing skills shortage is shaping IT...
Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...
Anthea van Scherpenzeel, Senior Sustainability Manager at Colt Data Centre Services, discusses the ways in which data centre owners/operators can make demonstrable progress on the road to Net Zero – with a...

News

Addition of Egress’ cloud email security solution to KnowBe4’s comprehensive product suite will create the largest, advanced AI-driven cybersecurity platform for managing human risk.
Kent County Council (KCC) has partnered with Cantium Business Solutions, a public sector IT services specialist, to deliver 9,000 Microsoft Surface Devices to its hybrid-working workforce.
In an ORX survey of 26 of the world’s biggest banks and insurers, three quarters (75%) of firms said that they have started using external GenAI tools in operations, with the most popular being Microsoft...
New Barracuda report explores why just 43% of organizations surveyed have confidence in their ability to address cyber risk, vulnerabilities, and attacks.