NEWS
Introducing security to the DevOps cycle

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More
NEWS
Securing our infrastructure: 3 steps OEMs need to take in the IoT age

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn to the consumer space where most of us have experienced slow computers, ad pop-ups from malware and, in some cases, data loss when we’ve had to completely reformat our storage drives. By Vivek...

Read More
NEWS
When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is...

Read More
NEWS
Cloud era technology needs cloud era security

The huge popularity of cloud services has seen organisations outsource applications, data and infrastructure to third party providers with the result that security perimeters have widened significantly. This has brought with it unwanted attention from cybercriminals, not only because cloud offers a...

Read More
NEWS
Assessing the delicate cybersecurity “fire triangle”

A physical roaring fire and a digital cyberattack might not have much in common – but these very...

Read More
NEWS
How cloud service providers can plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More
NEWS
Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision...

Read More
NEWS
Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full...

Read More
NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More

Videos

Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
DCW Asia 2025 - Part 2 of 3

News

New reports indicate growing cyber threats for government sectors, underlining the urgency for integrated cybersecurity measures.
Park Place Technologies has released Entuity Software V23.0, adding remote agent architecture, streaming telemetry and configuration management updates to extend infrastructure monitoring across distributed...
Commvault introduces Geo Shield, strengthening data protection and compliance for enterprises through enhanced cloud sovereignty solutions.
Assured Data Protection introduces a new service enhancing cyber resilience through automated backup and device restoration solutions.