NEWS
Introducing security to the DevOps cycle
  • Posted on 26th January 2020 in by Phil Alsop

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More
NEWS
Securing our infrastructure: 3 steps OEMs need to take in the IoT age
  • Posted on 12th January 2020 in by Phil Alsop

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn to the consumer space where most of us have experienced slow computers, ad pop-ups from malware and, in some cases, data loss when we’ve had to completely reformat our storage drives. By Vivek...

Read More
NEWS
When Identity Meets Data: A Solution for Unstructured Data
  • Posted on 12th January 2020 in by Phil Alsop

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is...

Read More
NEWS
Cloud era technology needs cloud era security
  • Posted on 19th December 2019 in by Phil Alsop

The huge popularity of cloud services has seen organisations outsource applications, data and infrastructure to third party providers with the result that security perimeters have widened significantly. This has brought with it unwanted attention from cybercriminals, not only because cloud offers a...

Read More
NEWS
Assessing the delicate cybersecurity “fire triangle”

A physical roaring fire and a digital cyberattack might not have much in common – but these very...

Read More
NEWS
Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision...

Read More
NEWS
Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full...

Read More
NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More

Videos

Chris Maclean, CEO of Open Energy Market, provides some great insights as to how data centres can leverage energy efficiency and sustainability initiatives not only to meet environmental goals but also to gain...
Subhagata (Subho) Mukherjee, Vice President, Global Head of Sustainability, Nokia, shares some key highlights from the company’s People and Planet 2023 report, covering a year of achievements and challenges...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...

News

The new facility will serve as a strategic interconnection hub for internet service providers (ISPs), cloud providers, financial institutions, and enterprises seeking reliable and scalable infrastructure to...
New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security advancements safeguard data-in-motion and data-at-rest across all exfiltration channels.
The combined company will bring together two cybersecurity SIEM and UEBA innovation leaders with renowned and demonstrated track records in serving customers with effective threat detection, investigation, and...
Over half of CISOs believe generative AI is a force for good and a security enabler, whereas only 25% think it presents a risk to their organisational security.