Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More
eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More
Radware introduces cyber attack mitigation service

Radware offers an “always-on” hybrid DDoS attack mitigation service to help protect enterprises.

Read More
Lancope appoints technology industry veteran Ben Todd as Sales Director for Europe

Todd brings 18 years of IT and security sales experience, including seven years with Cisco,to his...

Read More
Agari and Palo Alto agree to threat intelligence data exchange

Agari has entered into an agreement with Palo Alto Networks, the leader in enterprise security.

Read More
Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation...

Read More
No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of...

Read More
Dell breathes new life into Combat Stress’ IT operations

New networking infrastructure set to provide potential savings of £60,000.

Read More
CIOs still have their work cut out to keep up with the pace of innovation

Latest research suggests IT leaders are struggling to convince their colleagues that they can help...

Read More
Top five tips for security behaviour management programs

By Scott Greaux, Vice President, Products and Services, PhishMe.

Read More
ISMM accreditation for Azlan

Value-added distributor’s HP sales team achieves internationally-recognised qualification...

Read More
Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More
Unifying physical and Cloud security

Unified security architecture is capable of being mapped, tested and measured; enables more...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Dmitry Panenkov, CEO and founder of emma, the cloud management platform.
By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Chris Ackerson, SVP of Product at AlphaSense.