Gartner identifies security top ten

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More
Enhanced security for SMB mobile and remote workers

Dell SonicWALL Secure Mobile Access 100 Series OS 8.5 empowers IT with easy-to-use policy-enforced management tools that allow for quick adjustments to ensure that authorised users and trusted devices have easy, secure access to corporate data.

Read More
Securing cloud access for mobile users

Integrated offering gives IT full visibility and control over mobile devices, apps, and activities.

Read More
NEWS
Global Cyber Alliance sets out plan to tackle top cyber threats

The Global Cyber Alliance (GCA), a non-profit organisation aimed at tackling the cyber threat...

Read More
Index aids security benchmarking

Online resource behind benchmark survey promises to help companies measure the effectiveness of...

Read More
Only 17 per cent of businesses invest in cyber-security training for staff

The Open University says businesses need to understand the importance of building cyber-security...

Read More
NEWS
Two thirds of large UK businesses hit by cyber breach or attack in past year

Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.

Read More
73% of global brands and organizations attacked

82% of corporations were attacked repeatedly; 57% suffered subsequent theft.

Read More
Providing joint mobile protection services globally

Joint offering protects iOS® and Android® smartphones and tablets used in businesses of any...

Read More
NEWS
New report reveals critical need for improved trust to advance cloud adoption

Intel Security report shows majority of IT budgets will focus on cloud, indicates need for...

Read More
NEWS
Addressing industrial cybersecurity

Kaspersky Lab has introduced a specialised solution to secure critical infrastructure and...

Read More
Employees are the biggest cybersecurity threat to businesses today

Staff are twice as likely to take risks on work devices than they are on personal ones.

Read More
NEWS
Unsecured vendor access creates the perfect storm for cyber attacks

Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with...

Read More
QA warns we’re operating in the cyber security stone age when it comes to the Internet of Things

As the technology industry prepares to celebrate technical achievements in connecting objects...

Read More

Videos

Ciarán Forde, VP, Strategic Accounts & Alliances, Electrical Sector Sales - EMEA, Eaton, discusses the collaboration between Eaton and data centre design and build company CTS Nordics, which has recently seen...
Mat Brown, Senior Technical Marketing Engineer | Sustainability: Data Center & Hybrid Multicloud at Nutanix, who worked closely with Atlantic Ventures, as they produced the ‘Improving Sustainability in Data...
Kenneth Tan, Executive Director at Sardina Systems, Philip Kaye, Co-Founder and Director at Vespertec and Kristófer Andri Kristinsson, Product Manager and Business Development Manager at Borealis Data Center,...
Jad Jebara, President and CEO of Hyperview, introduces the recently unveiled suite of features which are being added to the company’s DCIM solution, with the new carbon footprint reporting system, providing...

Expert Opinions

By Terry Storrar, Managing Director at Leaseweb UK.
By Oz Olivo, VP, Product Management at Inrupt.
Anita Mavridis, VP of Product at Zivver, and Sue Musumeci, Director of Quality & Clinical Informatics at Chronic Care Staffing, explore practical strategies for empowering employees.