NEWS
Red tape restricts industrial cybersecurity initiatives

The recent Kaspersky report ‘State of Industrial Cybersecurity in the Era of Digitalisation’ has revealed the main barriers that inhibit or delay implementation of industrial cybersecurity projects. The most common obstacles include the inability to stop production (34%), and bureaucratic...

Read More
NEWS
Insider threat partnership

Joint solution integrates detection, automated investigations and incident response capabilities to reduce risks caused by compromised, negligent or malicious insiders.

Read More
NEWS
Dramatic rise in e-crime activity

Falcon OverWatch 2020 Mid-year report provides insights into massive uptick in intrusion activity and a sharp escalation in manufacturing sector targeting.

Read More
NEWS
Phishing - the most vulnerable sectors and departments

Cyber attacks cause great harm to the business world due to their evolving nature and it is expected that cyber attacks will cost businesses 6 trillion dollars worldwide next year. Keepnet Labs reveals its latest research on the most vulnerable sectors and internal departments affected by cyber...

Read More
NEWS
Internal security failures pose biggest cyber risk to businesses

837 security tests carried out on 353 businesses found that firms are extremely susceptible to...

Read More
NEWS
ThreatConnect acquires cyber risk quantification pioneer Nehemiah Security

Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the...

Read More
NEWS
People-centric DLP

Proofpoint has introduced multiple new Proofpoint innovations to ensure that organizations...

Read More
NEWS
Once more unto the breach

Nine out of ten IT professionals have experienced a data breach – with four out of five concerned...

Read More
NEWS
IT admins feel under equipped when it comes to remote working security

Shadow IT and a lack of business continuity planning present growing threats.

Read More
NEWS
People-centric protection

The combined solutions allow organisations to contain and remediate attacks against privileged...

Read More
NEWS
Nozomi delivers OT and IoT security via the Schneider Electric Exchange

Schneider Electric customers get faster access to cybersecurity expertise alongside the...

Read More
NEWS
Half of organisations exposed to data security risk in new world of work

One in two (53%) organisations are exposed to undue data security risk thanks to current procedures...

Read More
NEWS
Working from home heightens security challenges

Sudden changes in priorities, poor network visibility and lack of time cited as key issues for...

Read More
NEWS
HCL opens first innovative Cybersecurity Fusion Centre in Europe

HCL Technologies has opened its first European Cybersecurity Fusion Center (CSFC) in Gothenburg,...

Read More
NEWS
Delivering continuous compliance

New Pulse Policy Secure delivers continuous compliance with enhanced endpoint and IoT visibility,...

Read More

Videos

Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Lizzy McDowell, Director of Marketing at Kao Data, discusses the launch of the company’s Critical Careers: Celebrating Women in Digital Infrastructure – a new campaign highlighting the stories,...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Eric Herzog, Chief Marketing Officer at Infinidat, shares his future predictions about enterprise storage that CTOs should take into consideration and also advises as to what enterprises should be thinking...

Expert Opinions

By Matt Sherwen, Managing Director of Sherwen Studios.
By Frank Jones, CEO, IMS Evolve.
By Myles Leach, Managing Director NFON.
By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.