Eradicating rogue apps and domain infringement
  • Published in

Lagard?re gains visibility of over 10,000 public facing assets and protects its digital presence with RiskIQ.

Read More
Introducing Infoblox DNS Firewall as a Service
  • Published in

Cloud-based service expands the value of customer investment in Infoblox by providing visibility, policy management, and context-aware security for devices on-premise and off-premise.

Read More
NEWS
Awards celebrate industry success stories

The recent DCS Awards event, organised by Angel Business Communications, was a great opportunity to recognise the data centre technology and service innovations and achievements that are often taken for granted.

Read More
iSheriff and Soteria Intelligence partner
  • Published in

iSheriff  and Soteria Intelligence have formed a joint partnership to integrate Soteria Intelligence’s leading platform for social media threat assessment into iSheriff Complete, which provides cloud-based security for endpoints, websites and email. The combined offering is...

Read More
Tieto’s Security Services start-up strengthens its services

Tieto’s internal Security Services start-up, launched in January, now strengthens its service...

Read More
Index aids security benchmarking

Online resource behind benchmark survey promises to help companies measure the effectiveness of...

Read More
Danish order for Dencrypt

Dencrypt receives order from the Danish Ministry of Defence for encryption technology for...

Read More
NEWS
Putting an end to passwords?

Secure Cloudlink eliminates the need for passwords safeguarding organisations from cyber...

Read More
IT calling for CEOs to be held accountable for data breaches

New research from VMware finds over a quarter (29 percent) of UK IT decision makers state the...

Read More
Only 17 per cent of businesses invest in cyber-security training for staff

The Open University says businesses need to understand the importance of building cyber-security...

Read More
70 percent of Windows environments at risk from malicious attacks

IT admins report heightened interest in visibility: configurations, settings and standards.

Read More
Financial services IT professionals 'overconfident' in breach detection capabilities

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
NEWS
Minority are information governance high performers

Veritas Technologies has released new research findings that illuminate the most effective...

Read More
93 per cent of IT security leaders to maintain or increase Identity and Access Management spending

48 per cent say beating cyber hacking ‘very important’ if digital transformation is to...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
Ceasar Anquillare, Chairman & CEO, Winchester Capital, Nora L. Neergaard, Managing Director Europe & Co-Founder of WinStar and Dr David Bowen, Managing Director and Co-Founder of WinStar provide some...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...

Expert Opinions

By Andre Jay, Director of Technology at Warp Technologies.
As AI leads to bigger data centres, power grids and public perceptions may shape what’s actually possible.   By Tate Cantrell, Verne CTO.
By James Preston, Principal Security Consultant at ANSecurity.
By Martin Schirmer, Group Vice President of NEMEA, Cloudera.