Monsanto breach shows data security still lax 

Despite a seemingly endless collection of stories about data breaches caused, in the end analysis, by the application of less-than-best practices in managing data, breaches of security continue to happen

Read More
GOzeuS and CryptoLocker spawn masses of help  

The malware pair, already branded as cyber-armageden, have also prompted many of the anti-malware vendors to be show their public-spirited side and make available free tools to help track down and remove the malefactors before the day of reckoning    

Read More
IDaaS can now be the foundation of cloud security

As one of the early contenders in the development of ID as a Service, Centrify now sees its potential as the focal point for IT departments providing policy-based, real-time management of most aspects of cloud security 

Read More
Putting back-office and front-office together in the cloud

IBM’s Bluemix open cloud platform gets additional tools aimed at helping developers integrate front-end user engagement apps with the all-important back-office systems of record that are the heart and soul of every business

Read More
Is TrueCrypt, Snowden’s favourite, no more?

The anonymous team supporting the popular open source encryption software seems to have suddenly...

Read More
KPMG sees Google as `spam jam’ target

Google’s fully automated cars may seem a novelty for now, but are likely to become the norm,...

Read More
Symantec pushes hard on mobile security

The company puts significant development effort behind new security and management tools for mobile...

Read More
Compromised employee credentials blamed for eBay hack

Cyber-criminals are getting smarter at targeting just the right individuals in order to obtain...

Read More
CloudSigma aides Workspace testing availability

Being able to test new collaborative applications and services quickly and reliably has prompted...

Read More
Network storms are imminent says cPacket

And pervasive network intelligence is the only answer, the company says

Read More
Despite everything, is confidence in cloud security growing?

A recent survey by CipherCloud , following Snowden, PRISM, Heartbleed and other security lapses,...

Read More
Cloud Fabric looks to solve workload portability challenge

DR specialist, Zerto, has devised a strategy for delivering complete choice for operating...

Read More
DDoS control as an appliance

CenturyLink introduces a Mitigation Appliance option for its DDoS Mitigation Service

Read More
SDA - Future-proofing legacy mainframe applications for the cloud era

Dave LeClair, Senior Director of Strategy and Product Management of Stratus Technologies, outlines...

Read More

Videos

Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...

Expert Opinions

By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.
Global Commissioning’s CEO Louis Charlton’s latest article comes during National Apprenticeship Week, as the importance of building up our next generation of talent’s skills for data centre facilities is...
By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.
By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.