NEWS
Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision makers surveyed for NTT Security’s 2019 Risk:Value report expect recovery to take nearly 100 days on average, double the figure of a year ago. They also believe they would lose more revenue as a...

Read More
NEWS
Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full visibility into their organisation’s sensitive data and where it resides, cyber attackers will take advantage. However, this is becoming increasingly difficult as enterprise data and applications move to the...

Read More
NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More
NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...

Read More

Videos

Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...

News

Skillsoft partners with edX to enrich its platform with university courses, bridging skills gaps in the evolving workforce.
Red Hat expands its AI capabilities with Chatterbox Labs, emphasising AI safety and security within a hybrid cloud platform.
Keepit partners with Ingram Micro to extend its data protection solution to French resellers and MSPs, enhancing reach and robustness.
SailPoint announces new integrations with CrowdStrike to bolster identity-based threat response, advancing security operations and decision-making capabilities.