NEWS
The implications of integrating facial authentication to protect customer data
  • Published in

Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten...

Read More
NEWS
The state of IT security
  • Published in

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter...

Read More
NEWS
The all new Chief Data Officer (CDO)
  • Published in

Digital transformation has changed the face of business, driving disruptive change and creating spiralling amounts of data in its wake. By Steve Abbott, CEO at DocAuthority.

Read More
NEWS
GDPR Compliance – Reverting to Best Practice Security
  • Published in

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from all sectors struggled to meet the deadline. According to our research announced around the same time, more than two thirds of companies were not confident of being fully compliant ahead of the GDPR...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a...

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
Achieving the right balance between insight and data privacy

Mark Humphries, Managing Consultant for Civica Digital, explores the importance of data structure...

Read More
NEWS
From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their...

Read More
NEWS
Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More

Videos

Tom Fairbairn, Distinguished Engineer at Solace, explains how Absolics is using the Solace PubSub+ Platform to establish a real-time information flow across all enterprise applications in its US factory....
Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...
Jeff Borrman, CEO, Bioscope Technologies, explains the Bioleaching and Bio-refining processes it is developing at industrial scale for the sustainable recovery of base and precious metals from printed circuit...
Paul Alexander, Nokia's Head of Cloud Infrastructure Business, Europe at Nokia, discusses the network challenges faced by the data centre industry in the face of AI’s rapid expansion, as well as how...

News

2025 will see UK businesses undertake a major shake up of their IT and data practices, new research shows.
New bundles, integrated task management and enhanced billing capabilities empower MSPs to deliver comprehensive security services with ease.
Graylog has unveiled significant security advancements to drive smarter, faster, and more cost-efficient security operations. The company’s latest capabilities include advanced data routing, asset-based risk...
Wireless Logic report reveals significant demand for eSIM, remote SIM provisioning and robust support services as enterprises scale IoT deployments worldwide.