NEWS
The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More
NEWS
When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free...

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more...

Read More
NEWS
Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the...

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the...

Read More
NEWS
Why have we become desensitised to cyber-attacks?

1989 was of a year of positive milestones which would have a profound impact on the way we live and...

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and...

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global...

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a...

Read More
NEWS
Why a data breach doesn’t have to mean data loss

Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric...

Read More

Videos

Paul Savill, Global Practice Leader for Network and Edge at Kyndryl. Spends his time helping major organisations modernise their infrastructure to make the most of AI, strengthen security and prepare for the...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...

News

Discover the transformative Nutanix and Pure Storage solution, optimizing enterprise IT with simplicity, performance, and scalability.
Lenovo's new portfolio addresses AI and data storage needs, offering innovative solutions for enterprises looking to modernise infrastructure.
Exertis UK reveals a drastic headcount reduction, impacting over 1,000 employees amid recent ownership changes.
UK Connect teams up with ShelterZoom to enhance cybersecurity measures, targeting improved document control and compliance. The duo aims to transform digital asset protection in construction and defence.