NEWS
Five steps to effectively manage a cyber-attack
  • Posted on 19th August 2016 in by Phil Alsop

By Vijay Bharti, Vice President & Head of Security Services, Happiest Minds.

Read More
Why security and compliance are still the main blockers to cloud adoption
  • Posted on 18th August 2016 in by Phil Alsop

By Monica Brink, EMEA Marketing Director, iland.

Read More
How Windows 10 can unite the enterprise
  • Posted on 12th August 2016 in by Phil Alsop

By Ojas Rege, Chief Strategy Officer at MobileIron.

Read More
NEWS
Cybercriminals are ‘following the money’ amidst Office 365 migration
  • Posted on 10th August 2016 in by Phil Alsop

By Lewis Henderson, Director, Client Engagement at Glasswall Solutions.

Read More
Are we too work-obsessed to be secure?

By Per Stritich, Vice President EMEA, OneLogin.

Read More
NEWS
Malware is not the answer

By Kasey Cross, Sr. Product Manager, LightCyber.

Read More
Battling the botnet armies

Jeff Harris, VP, Solutions Marketing at Ixia looks at the growing armies of botnets, and how their...

Read More
Cyber criminals are turning to the weakest link: SMEs

By Chris Dye, VP Alliances, Glasswall Solutions.

Read More
‘Have IT your way’: How network security should be like ordering a burger

Joe DiPietro at AlgoSec explores how businesses can improve the IT security/application delivery...

Read More

Videos

Data Centre World 2026
Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
Rob Coupland, CEO at Pulsant, discusses the company’s £10 million investment in its Milton Keynes data centre to provide high-density, sovereign compute capacity to support AI transformation, with plans to...

News

Infosecurity Europe 2026 will explore the impact of geopolitics on cybersecurity, featuring insights from industry experts and research findings.
The latest TCG specification aims to strengthen device security with post-quantum cryptography algorithms to defend against quantum attacks.
Johnson Controls is conducting a European tour with a mobile showcase featuring its energy-efficient technologies and solutions.
The Keepit Annual Data Report 2026 highlights shifts in data recovery practices as companies rely more on SaaS platforms.