NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services,...

Read More
Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More
Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...

Read More

Videos

Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Dan Dulac, Extreme Networks’ VP of Solutions Strategy, discusses the recently launched Extreme Platform ONE™ for Managed Service Providers (MSPs). Built on a unique AI-driven multi-tenant architecture,...

Expert Opinions

By Steve Prescott-Jones, director of managed services at UBDS Digital.
By Juan Colina, EMEA data centre & IT segment leader, Eaton.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
AI is revolutionising work in the unified communications sector, but with its transformative potential also come challenges; William Rubio, CallTower’s CRO explores the key areas where AI is making an...