NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA)...

Read More
NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has transformed the data landscape and its effects look set to extend into the future, as nations worldwide adopt similar laws. Furthermore, big tech companies are leading the way with assurances of greater...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with...

Read More

Videos

Tal Barmeir, Co-founder & CEO Blinq.io, discusses her career in the IT industry, sharing some valuable insights when it comes to entrepreneurship and start-ups, alongside her belief that equality needs to be...
Jamie Akhtar, Co-Founder and CEO at CyberSmart, discusses the importance of cybersecurity solutions developed specifically for the SME market and the benefits they can bring to both the Channel and end users...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...

News

Digital Realty has formed a transformative collaboration with Enel X Global Retail, which is expected to result in the avoidance of more than 30,000 tonnes of CO₂ emissions from Ireland’s energy grid...
Dell expands edge partner ecosystem with Hyundai AutoEver and Intel to help manufacturers derive more value from edge data with AI.
Enhanced employee dashboards look beyond performance metrics to elevate employee engagement and improve how IT organizations measure operational excellence.
RAGroup increases activity by over 300% since its last known attacks in December 2023, entering the top three threat actors for the first time.