NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services,...

Read More
Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More
Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...

Read More

Videos

Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...
Welcome to the WinStar Introductory Presentation!
Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...

Expert Opinions

TES Power’s Managing Director, Michael Beagan explores the top five power challenges the data centre industry may face in 2026, in light of the surge in AI. With a huge increase in demand, power is becoming...
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Dave Adamson, Solutions Director at Creative ITC.
By David Davies, Associate Director at Arup.