NEWS
Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More
Free Cloud-based enterprise IoT Vulnerability Scanner

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More
NEWS
Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching...

Read More
NEWS
New year, new risks: 2017’s top cyber threats

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....

Read More
2017 Predictions

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More
????Global Cyber Alliance appoints Troels Oerting as Chairman of the board

The Global Cyber Alliance (GCA), an international, non-profit organization focused on addressing...

Read More
NEWS
Cybersecurity - could do better

Nuix has  released the findings from its third annual survey of corporate information...

Read More
NEWS
Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering...

Read More
Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work...

Read More
Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study...

Read More
NEWS
2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...

Read More
Cyclance launches Channel programme

Building security expert community to deliver AI-based protection.

Read More
NEWS
Security does not equal maturity

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...

Read More
NEWS
Anomali Labs 2017 predictions

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...

Read More

Videos

Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...

Expert Opinions

It’s easy to be astonished by how fast AI has progressed. But industry insiders are equally amazed by the pace at which the infrastructure underlying artificial intelligence has developed – and the surge...
By Michael Hunger, VP of Product Innovation, Neo4j.