New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More
Insiders pose the major threat

Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on its behalf by Harris Poll and in conjunction with analyst firm Ovum in fall 2014 among 818 IT decision makers in various countries, including 408 in the United States. The report details striking...

Read More
Rouse protects employees from spear-phishing with Mimecast cloud email security

IP firm upgrades defences against rising volume of sophisticated phishing attacks.

Read More
Security on the shelf

A report about wasteful spending.

Read More
IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled...

Read More
Tough choices ahead for cash-strapped IT departments in 2015

Aging laptop and desktop environments and end of life software challenges drive budget...

Read More
OPSWAT acquires email security provider Red Earth Software

OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect...

Read More
Enterprise Immune system chosen for maritime insurance industry

DNK, a major insurance company for the shipping industry, has selected Darktrace’s Enterprise...

Read More
Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading...

Read More
The Vollrath Company selects SimpliVity OmniCube Hyperconverged Infrastructure

Global manufacturer benefits from cost savings and operational efficiency through unsurpassed...

Read More
Azzurri adds to its cyber security credentials

Managed services provider achieves the Government’s new Cyber Essentials Plus accreditation.

Read More
Dell Software’s InTrust helps organisations securely collect, store, search and analyse data

New IT Search feature speeds security investigations and audits with single web interface, allowing...

Read More
Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of...

Read More
Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in...

Read More

Videos

Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Andreas Keiger, Chief Revenue Officer at ZutaCore, discusses the AI power density challenge facing data centre owners and operators, looking at the various liquid cooling options available to address the...

Expert Opinions

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Troels Rasmussen, GM of Security, N-able.
By François Haykal, Senior Project Consultant at BCS, the specialist services provider to the digital infrastructure industry.