vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by giving enterprises and service providers visibility, control and threat defences for the agile data centre.

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More
Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More
How to beat the top vulnerabilities

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More
Very small businesses eager for mobile technology but lack security

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device...

Read More
ManageEngine enhances identity and access management portfolio

ManageEngine, the real-time IT management company, has announced enhancements across its identity...

Read More
Leading IT security technology 8MAN takes Europe ‘by storm’

Software distributor Prianto supports the plans for internationalisation made by Berlin-based...

Read More

Videos

Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Tom Artinian, CEO and President of TiniFiber, shares the company’s vision and mission which centres on delivering ultra-rugged, high-speed fiber cabling, connectivity, tools, and solutions that enable...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Tony Hasek, CEO & Co-founder, Goldilock Secure.
It’s easy to be astonished by how fast AI has progressed. But industry insiders are equally amazed by the pace at which the infrastructure underlying artificial intelligence has developed – and the surge...