NEWS
The five myths of GDPR

May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for...

Read More
NEWS
Why organisations should mask data on demand to protect privacy across enterprise

Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic...

Read More
NEWS
The future of passwords in the enterprise

Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use...

Read More
NEWS
Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...

Read More
NEWS
The implications of integrating facial authentication to protect customer data

Identity theft has become a major problem. It has steadily escalated globally as the need for...

Read More
NEWS
The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused...

Read More
NEWS
The all new Chief Data Officer (CDO)

Digital transformation has changed the face of business, driving disruptive change and creating...

Read More
NEWS
GDPR Compliance – Reverting to Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a...

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...

News

Altigen has partnered with Tollring to deliver Analytics 365 call recording and call analytics for Microsoft Teams users in the North American market.
Spectra Logic and Geyser Data have launched a tape-as-a-service archive deployment in London, enabling expanded archival options for European customers.
London Tech Week 2026 will feature a Deep Tech Stage covering developments in space, AI, quantum computing and other emerging technologies.
Exploring the challenges and implications of AI adoption for cybersecurity in modern enterprises.