NEWS
Sensitive data discovery: before you can control and protect it, you need to know where it is
  • Published in

The consequences of sensitive data getting into the wrong hands can be significant, and a considerable source of risk and anxiety for organisations. But a bigger problem logistically can be determining where such data exists across the business, so companies can implement protective measures. James...

Read More
NEWS
Cybersecurity in a digitalised world
  • Published in

As our world becomes increasingly interconnected, businesses and individuals are realising benefits they could once only dream of. Thanks to this digital revolution, our critical infrastructure can be operated with increased efficiency and reliability, helping to provide consumers with the services...

Read More
NEWS
How backup and recovery can help with GDPR compliance
  • Published in

According to the recently-published DLA Piper GDPR Data Breach Survey 2020, more than 160,000 data breach notifications have been reported across Europe since the General Data Protection Regulation (GDPR) came into force in May 2018. The survey also found that data protection regulators have...

Read More
NEWS
SASE: The difference between a transit cloud and a destination cloud

Modern businesses are under pressure to deliver when it comes to the experience, they offer their employees and customers when accessing applications in the cloud. Digital-savvy users expect seamless and consistent access to applications and services, regardless of where they are connecting or...

Read More
NEWS
Service providers on the edge

Common automation frameworks and the end of speed and security compromises. By Bart Salaets,...

Read More
NEWS
With 5G and IoT, it’s a new day with new risks

Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The...

Read More
NEWS
A four-step guide to engineering privacy into any system

By Nehal Maniar, Chief Technology Officer, Trūata.

Read More
NEWS
Global tension points to a future of destructive malware

By Greg Foss, Senior Threat Intelligence Director, VMware Carbon Black.

Read More
NEWS
Providing the keys to the Smart City

By Sean Wray, VP NA Government Programs, Certes Networks.

Read More
NEWS
Top tips for improving endpoint visibility and control in 2020

In 2019 we saw a steady increase in the number and modes of cyberattacks. In fact, more than half...

Read More

Videos

Andy Venables, Chief Technology Officer & Co-Founder of POPX, discusses some of the challenges facing MSPs today, including providing a modern or digital service desk experience, managing service delivery in...
Paul Alexander, Nokia's Head of Cloud Infrastructure Business, Europe at Nokia, discusses the network challenges faced by the data centre industry in the face of AI’s rapid expansion, as well as how...
Alain Sanchez, EMEA CISO, Fortinet, discusses the findings of the company’s recent Global Cybersecurity Skills Gap Report that highlights the critical need for a collaborative, multi-faceted approach to...
Jeff Borrman, CEO, Bioscope Technologies, explains the Bioleaching and Bio-refining processes it is developing at industrial scale for the sustainable recovery of base and precious metals from printed circuit...

News

XPS delivers financial flexibility to help channel partners close large deal pipeline, ease cashflow constraints, increase customer engagement and stimulate growth.
Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform aiming to address the full spectrum of data security challenges across today’s complex data landscape.
HCLTech has launched its advanced AI Transformation academy in partnership with Multiverse, a technology company delivering high-quality training through applied learning. HCLTech's AI academy aims to upskill...
Nokia and Lenovo partner to develop high-performance AI/ML data center solutions to meet growing workloads across industries and service providers.