NEWS
IoT security: Keeping connected devices secure over time
  • Published in

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more...

Read More
NEWS
Cyber security predictions for 2019
  • Published in

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer...

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing
  • Published in

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a...

Read More
NEWS
Why have we become desensitised to cyber-attacks?
  • Published in

1989 was of a year of positive milestones which would have a profound impact on the way we live and work today. The World Wide Web was invented, the Berlin Wall was torn down, and the first GPS satellite went into orbit. However, not everything about the year was a cause for celebration. Alongside...

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and...

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global...

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a...

Read More
NEWS
Why a data breach doesn’t have to mean data loss

Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric...

Read More
NEWS
The tumultuous relationship between data and security

Our daily news updates have become littered with data breach after data breach, each costing...

Read More
NEWS
Taking the long view – why threat hunting should underpin strategic IT security

The US Navy SEALs have a well-known motto: “The only easy day was yesterday.” Taking a look at...

Read More
NEWS
How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years...

Read More

Videos

Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...
Tony Abate, Vice President and Chief Technology Officer at AtmosAir Solutions, explains how to make data centres more efficient and sustainable by implementing bi-polar ionisation (BPI) technology. The...
Dr Clare Walsh, Director of Education at the Institute of Analytics (IoA), and one of the of the world’s leading academic voices in data analytics and AI, discusses the ways in which AI will (and won’t)...
Mat Brown, Senior Technical Marketing Engineer | Sustainability: Data Center & Hybrid Multicloud at Nutanix, who worked closely with Atlantic Ventures, as they produced the ‘Improving Sustainability in Data...

News

Eficode, a leading DevOps company, has been awarded GitHub Channel of the Year in the EMEA Platform category at the prestigious GitHub Channel Partner of the Year Awards 2024. This award recognizes Eficode’s...
NTT DATA’s new Managed Detection & Response service powered by Palo Alto Networks Cortex XSIAM combines simplified security analytics and threat intelligence to help enterprises advance cyber resilience.
Wireless Logic report reveals significant demand for eSIM, remote SIM provisioning and robust support services as enterprises scale IoT deployments worldwide.
New data reveals that outdated backup technology, limited backup data encryption, and failed data backups are top vulnerabilities to attacks.