How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical...

Read More
IL3 accreditation

Platform securely bridges access between IL2 and IL3 data while providing connectivity to the Public Services Network.

Read More
Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More
Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still...

Read More
IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare...

Read More
Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...

Read More
IT budgets set to increase according to a third (37%) of financial services organisations

Survey of UK & Ireland financial services sector reveals companies are set to spend as...

Read More
New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256...

Read More
The Snowden Wasteland

By Calum MacLeod, VP of EMEA at Lieberman Software.

Read More
Skyscape secures Cyber Essentials Plus Scheme

Skyscape Cloud Services Limited has successfully achieved certification for the Government’s...

Read More
nCrypted Cloud launches European Division

nCrypted Cloud has announced the opening of its European operation. nCrypted Cloud is the secure...

Read More
South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace...

Read More
Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance...

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc...

Read More

Videos

Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

By Ryan Davis, Channel Account Manager at CultureAI.
By Michael Vallas, Global Technical Principal, Goldilock Secure.