NEWS
Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified...

Read More
Managing identity in the Cloud

10Duke has launched the 10Duke Identity Provider, a cloud-based Identity-as-a Service product. Currently in deployment with pre-launch partners the 10Duke Identity Provider already supports more than 1 million active IDs worldwide and combines technicality complex identity management...

Read More
NEWS
Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.

Read More
NEWS
AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom,...

Read More
NEWS
Crosskey selects AlienVault USM for in-house security management

Finnish card payment system provider gains complete security visibility and combats banking malware.

Read More
Enterprise Immune System technology to be integrated in BT’s security offerings

BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat...

Read More
NEWS
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity vs functionality

Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity vs functionality.

Read More
NEWS
Coat acquired

Blue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...

Read More
Cloud Access Manager enables secure and convenient access to the applications users require, when they need them

Dell has released Dell One Identity Cloud Access Manager 8.0, which leverages Dell’s new...

Read More
NEWS
BeyondTrust helps RWE Supply & Trading

Leading pan-European energy trading house meets tight budgetary and regulatory constraints through...

Read More
Proofpoint launches the Nexgate Social Media Threat Centre

Real-time console details social media threats, risk trends and security effectiveness for...

Read More
Clavister launches Security-as-a-Service firewall offering for Dutch Channel partners

Clavister’s pay-as-you-go service gives channel partners and VARs new revenue streams.

Read More
NEWS
The Catalan Institute of Nanotechnology protects its confidential data

Institute secures its networks and mobile devices using Check Point’s advanced threat...

Read More
Integrating encrypted communications with VPN & EMM technology

saltDNA has launched a technology which it says is is set to revolutionise how global enterprises...

Read More

Videos

Kenneth Tan, Executive Director at Sardina Systems, Philip Kaye, Co-Founder and Director at Vespertec and Kristófer Andri Kristinsson, Product Manager and Business Development Manager at Borealis Data Center,...
Alex Sharp, Chief Projects Officer, Data Centres at Nscale, outlines the scale of the AI data centre challenge – with average rack consuming 130 kilowatts of power, and as chips become more sophisticated, so...
Jad Jebara, President and CEO of Hyperview, introduces the recently unveiled suite of features which are being added to the company’s DCIM solution, with the new carbon footprint reporting system, providing...
Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...

Expert Opinions

By Danny Lopez, CEO of Glasswall.
By Jason Beckett, Head of Technical Sales, Hitachi Vantara.
By Anugraha Benjamin, Manager, Infrastructure at Progress.
With data centres now deemed as critical infrastructure, organisations must evolve beyond traditional security to combat sophisticated cyber threats. By Jon Mort, CTO, The Adaptavist Group,