NEWS
Are businesses going into reverse on cybersecurity?
  • Posted on 6th December 2019 in by Phil Alsop

The time needed by UK organisations to recover from a data breach is increasing. Senior decision makers surveyed for NTT Security’s 2019 Risk:Value report expect recovery to take nearly 100 days on average, double the figure of a year ago. They also believe they would lose more revenue as a...

Read More
NEWS
Businesses can’t fight what they cannot see
  • Posted on 6th December 2019 in by Phil Alsop

It doesn’t take a rocket scientist to work out that if security teams don’t have full visibility into their organisation’s sensitive data and where it resides, cyber attackers will take advantage. However, this is becoming increasingly difficult as enterprise data and applications move to the...

Read More
NEWS
Privacy + development = securer applications
  • Posted on 1st December 2019 in by Phil Alsop

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide
  • Posted on 1st December 2019 in by Phil Alsop

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme...

Read More
NEWS
Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More
NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...

Read More

Videos

Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...

News

Trellix unveils innovations in cybersecurity, bolstering the convergence of OT-IT environments and enhancing perimeter defence against sophisticated threats.
Gartner reveals top contenders in the AI race, highlighting companies setting trends in various technology domains.
Salute partners with MCIM to enhance operational intelligence, boosting performance in AI/HPC environments.
Cohesity enhances its relationship with Google Cloud to offer integrated AI, cybersecurity, and data solutions, driving security and transformation for enterprises.