Centrify joins Cloud Security Alliance
  • Published in

Centrify joins Cloud Security Alliance as a corporate member, brings expertise in strengthening enterprise security by managing and securing user identities from cyberthreats.

Read More
Cyber London seeks out Europe’s brightest security start-ups
  • Published in

Cyber London has started its second programme to support the brightest new European security companies.

Read More
ETM expansion
  • Published in

Blue Coat Systems, Inc.has added seven new partners to the Blue Coat Encrypted Traffic Management (ETM) Ready Program, bringing the total number of partners to 17. 

Read More
NEWS
Dell to acquire EMC
  • Published in

Brings together the industry’s leading innovators in digital transformation, software-defined data centre, hybrid cloud, converged infrastructure, mobile and security.

Read More
New on-line platform provides unparalleled access to UK-based cyber security innovators

The UK Cyber Security Forum (UKCSF), the umbrella organization for the internationally renowned...

Read More
IT more complex than ever, say 93 per cent of UK CIOs

Cloud computing, legacy technology and software licensing cited as biggest contributors to IT...

Read More
Varonis extends Fireeye Threat Analytics

Varonis Systems, Inc. has given details on the interoperability of its DatAdvantage and DatAlert...

Read More
How leaky is your device?

A new generation of digital devices that will protect consumers from cyber-attacks could be a...

Read More
Beware wearables

 Ipswitch's  2015 Wearable Technology Survey  reveals concerns about wearable...

Read More
NTT Com Security adds machine learning detection capabilities

NTT Com Security, in collaboration with NTT Communications, has  added machine...

Read More
NEWS
Alert Logic releases 2015 Cloud Security Report

Cyber attackers follow companies into the cloud; research shows 45 percent increase in...

Read More
ECJ deliver damning decision on US data protection

The Court of Justice of the European Union (CJEU) has delivered a damning decision on US data...

Read More
Mobility is a critical success driver

Mobility is transforming how enterprises do business, and most organisations expect the burgeoning...

Read More
Public networks used for corporate access

Bromium®, Inc. has published the results of “CTIA Super Mobility – Understanding Mobility...

Read More
The 'outside' insider threat

61 percent cite privileged account takeover as most difficult cyber attack stage to mitigate; 44...

Read More

Videos

Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
Welcome to the WinStar Introductory Presentation!
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...

Expert Opinions

By James Preston, Principal Security Consultant at ANSecurity.
By David Davies, Associate Director at Arup.
By Dael Williamson, EMEA CTO, Databricks.
AI’s true value starts with the right mindset. By Darin Patterson, VP of Market Strategy Make.