NEWS
Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More
Free Cloud-based enterprise IoT Vulnerability Scanner

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More
NEWS
Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching...

Read More
NEWS
New year, new risks: 2017’s top cyber threats

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....

Read More
2017 Predictions

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More
????Global Cyber Alliance appoints Troels Oerting as Chairman of the board

The Global Cyber Alliance (GCA), an international, non-profit organization focused on addressing...

Read More
NEWS
Cybersecurity - could do better

Nuix has  released the findings from its third annual survey of corporate information...

Read More
NEWS
Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering...

Read More
Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work...

Read More
Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study...

Read More
NEWS
2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...

Read More
Cyclance launches Channel programme

Building security expert community to deliver AI-based protection.

Read More
NEWS
Security does not equal maturity

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...

Read More
NEWS
Anomali Labs 2017 predictions

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer at Salute.
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.