NEWS
Five top tips for small businesses adopting encryption
  • Posted on 25th March 2019 in by Phil Alsop

Becrypt has been in the disk encryption business for more than 15 years and have carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time,...

Read More
NEWS
The role of Information Assurance in managing data security
  • Posted on 22nd March 2019 in by Phil Alsop

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More
NEWS
When Mobile Security and Compliance Clash – The MDM crisis
  • Posted on 18th March 2019 in by Phil Alsop

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free...

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government
  • Posted on 11th March 2019 in by Phil Alsop

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage....

Read More
NEWS
Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the...

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the...

Read More
NEWS
Why have we become desensitised to cyber-attacks?

1989 was of a year of positive milestones which would have a profound impact on the way we live and...

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and...

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global...

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a...

Read More

Videos

Michael Crabb, SVP Commercial, Last Energy, talks through the energy start-up’s micro-scale nuclear power plant - a central component of the company's 20 MW modular power plant, which can be developed within...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...
Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...

News

New partnership reinforces Hitachi Vantara defense-in-depth strategic approach, combining company's infrastructure expertise with Veeam's data protection and ransomware recovery software.
The Memorandum of Understanding (MoU) agreement aims to deliver high-capacity infrastructure within 5 years across nine data centers in Riyadh, Jeddah, and Dammam.
The first module of the exascale supercomputer JUPITER, named JEDI, is ranked first place in the Green500 list of the most energy-efficient supercomputers worldwide, as announced by Forschungszentrum Jülich...
OVHcloud has introduced new dedicated High Grade Bare Metal servers featuring top-of-the-line Intel Xeon Gold 5th Generation processors.