Business Transformation increases Attack Surface

Data security consultancy offers seven steps to a successful transition to Cloud and Mobility environments.

Read More
StealthWatch for ‘enhanced’ threat detection

StealthWatch 6.4 features new levels of network visibility and security intelligence for improved forensics and incident response.

Read More
If You Get Your Security Right, Big Data Can Work For You

By Dave Anderson, Senior Director, Global Strategy and Marketing, Voltage Security.

Read More
Cyber attacks can take months to control even after detection

Advanced cyber attacks being made by state-sponsored cyber terrorists can take months to control...

Read More
SEVEN PRINCIPLES MDM-Lösung im Einsatz bei der Arbeiterkammer Wien

Die Arbeiterkammer (AK) Wien setzt für verbesserte Sicherheit und schlankere Verwaltung der...

Read More
Per E-Mail-Verschlüsselung Betriebsgeheimnisse schützen

Schon für einigermaßen begabte Angreifer ist es mittlerweile ein Leichtes, E-Mails...

Read More
Daten vor allem im Außendienst großen Risiken ausgesetzt

Geschäftsreisen gehören für Außendienstmitarbeiter erfolgreicher und vor allem...

Read More
IT-Verfügbarkeit: Das Problembewusstsein der Verantwortlichen bleibt ausbaufähig

Eine Studie konnte belegen, dass IT-Ausfälle bei größeren mittelständischen...

Read More
Double coup for Softcat with advanced Symantec Master Specialist certifications

Softcat has achieved its most advanced Symantec accreditations yet in a leap which cements its...

Read More
The Marine Institute discovers greater functionality

Varonis has revealed details of its work with the Marine Institute. With a primary objective to...

Read More
IT transformation tops UK CIO Agenda

Research from SunGard Availability Services reveals plans for technology refresh in the next 36...

Read More
Trotz strenger Vorschriften zur Aktenaufbewahrung agiert jedes dritte europäische Unternehmen nur wenig systematisch

Europaweiter Leitfaden von Iron Mountain und der Anwaltskanzlei De Brauw Blackstone Westbroek soll...

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, looks at consolidated data protection - endpoints and SaaS.
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...

Expert Opinions

Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Micah Heaton, Executive Director, Microsoft Security Centre of Excellence at BlueVoyant.
By Stig Martin Fiska, Global Head of Cognizant Ocean.
By Rami Jebara, CTO and Co-Founder at Hyperview.