Citrix launches 'unified' digital workspace

Digital transformation, cloud and new workstyles are forcing businesses to rethink how and where technology is deployed and secured. This week at Citrix Synergy, Citrix is unveiling new innovations that support the shift to people-centric computing, enabling organizations to deliver a...

Read More
NEWS
Large numbers of businesses and charities suffered at least one cyber attack in the past year

Businesses urged to protect themselves against cyber crime after new statistics show over four in ten of businesses and two in ten charities suffered a cyber breach or attack in the past 12 months.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
NEWS
More than 2.5 billion records stolen or compromised in 2017

Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal...

Read More
'World-leading' cyber centre to be developed in London’s Olympic Park

A ?13.5 million innovation centre to bring industry, researchers and investors together to boost...

Read More
UK organisations must do more to develop cyber security skills

Just one in four (26%) IT professionals feel they are adequately experienced in cloud security.

Read More
Report highlights the need for cyber resilience

Fourth annual report provides insights and trends drawn from analysis of more than 560 incidents.

Read More
Companies braced for breaches

More than a quarter of companies expect to be breached in next six months according to new global...

Read More
TechData teams with iPass

Tech Data has form a pan-European agreement with iPass Inc. (Nasdaq: IPAS), a leading provider of...

Read More
Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other...

Read More
NEWS
DigiCert selected to provide Root CA for AeroMACS

DigiCert has been selected to host the Root CA for Aeronautical Mobile Airport Communication...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.
By Frédéric Godemel, EVP Energy Management, Schneider Electric.
By Mala Pillutla, Vice President of Sales for Log Management, Dynatrace.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.