Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the cyber risks confronting government and offers recommendations to mitigate these risks, entitled ‘Operating Securely in the Digital World’. The report provides the outlines of two tools, a...

Read More
Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More
HP bringt Next-Generation Firewall

- Neue Firewall von HP TippingPoint inspiziert bis zu zehn Gigabit Daten pro Sekunde - Neue Online-Plattform HP Threat Central sammelt IT-Sicherheitsinformationen durch Crowdsourcing

Read More
F5 Networks erwirbt Versafe und unterstützt so seine Kunden beim Schutz vor Online-Betrug

F5 Networks gab die Übernahme der Versafe Ltd. bekannt. Mit der Übernahme erweitert...

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...

Read More
GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment...

Read More
Allianz partners with forensic IT experts

Cyber crime is costing the UK economy £27bn.

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two...

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More

Videos

Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
DCW Asia 2025 - Part 1 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.
By Simon Seymour-Perry, CEO of Logica Security.