NEWS
Lifting and shifting legacy applications is a cyber-security essential
  • Posted on 23rd February 2020 in by Phil Alsop

By Mat Clothier, CEO at Cloudhouse.

Read More
NEWS
Deception for reducing risk and creating a defender’s advantage
  • Posted on 23rd February 2020 in by Phil Alsop

Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn...

Read More
NEWS
Data and Privacy: Personalisation vs privacy, getting the balance right
  • Posted on 23rd February 2020 in by Phil Alsop

By Sharad Patel, data privacy expert, PA Consulting.

Read More
NEWS
Working here, there and everywhere with collaborative technology
  • Posted on 23rd February 2020 in by Phil Alsop

By Sion Lewis, VP of EMEA at LogMeIn.

Read More
NEWS
The importance of storing data closer to home

There are three key components when we talk about the concept of privacy: Laws, customs and...

Read More
NEWS
Why Insider Threats Are Harder to Detect in Cloud Environments

The adoption of cloud computing by businesses is progressing at an incredible rate. The cloud...

Read More
NEWS
The rise of digital transformation at the edge

With or without realising, we’ve encountered the benefits of digital transformation in various...

Read More
NEWS
Introducing security to the DevOps cycle

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More
NEWS
Securing our infrastructure: 3 steps OEMs need to take in the IoT age

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn...

Read More
NEWS
When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors...

Read More
NEWS
Cloud era technology needs cloud era security

The huge popularity of cloud services has seen organisations outsource applications, data and...

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, looks at consolidated data protection - endpoints and SaaS.
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Ciaran Flanagan, Global Head of Data Center Solutions at Siemens, explains the decision for Siemens Smart Infrastructure to open a data centre technology hub in the Iberian region, before going on to discuss...

News

ThingsRecon's study reveals alarming levels of digital hygiene issues, urging enterprises to prioritise their cybersecurity practices.
Digital Realty is deepening its renewable initiatives in Illinois, boosting solar capacity and supporting local communities while advancing global sustainability goals.
Integrity360's alliance with HackerOne revolutionises cyber defence by leveraging a global network of ethical hackers for continuous threat vigilance.
Aurora strengthens its position in UK managed services with a strategic acquisition of Right Digital Solutions, bolstering its offerings in print, telecoms, and IT.