Logo
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity
  • Posted on 12th July 2019 in by Phil Alsop

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI
  • Posted on 5th July 2019 in by Phil Alsop

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest possible return. So it makes sense that, after the first investment standstill since 2012, marketers are increasingly adopting technologies that can optimise targeting precision and impact, none more so...

Read More
NEWS
Where does the responsibility for cloud breaches lie?
  • Posted on 26th June 2019 in by Phil Alsop

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and...

Read More
NEWS
IAM and GDPR: How can security teams ensure they work in tandem?
  • Posted on 26th June 2019 in by Phil Alsop

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
Achieving the right balance between insight and data privacy

Mark Humphries, Managing Consultant for Civica Digital, explores the importance of data structure...

Read More
NEWS
From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their...

Read More
NEWS
Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
GDPR – Keeping a Continuous Focus on Compliance

The General Data Protection Regulation (GDPR) came into force on 25 May 2018. In the months that...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...

Read More

Videos

Abel Gnanakumar, Vice President, Commercial HVAC - Asia, Middle East & Africa at Copeland, discusses the surge in data centre development across Asia and its unique climate challenges, the twin drivers of AI...
DCA Data Centre Transformation Conference 2025
Simon Harris, Director of Critical Infrastructure at BCS, discusses the role that legacy data centres have in supporting the development of AI, with inferencing seen as a major opportunity. Simon outlines the...
Legrand’s FAT Center in Tuscany and Keor FLEX UPS deliver proven reliability, efficiency, and sustainability for next-generation data centers.

News

Nokia partners with Zayo to deploy cutting-edge IP network architecture, transforming connectivity and expanding digital service offerings.
Check Point and Lakera have launched the b3 benchmark to enhance LLM security in AI agents, promising improved security measures for developers.
SUSE unveils the pioneering SLES 16 with integrated Agentic AI, promising enhanced operational efficiency and unprecedented Linux support lifecycles.
Kaseya's fall 2025 release introduces over 90 innovative enhancements in cybersecurity and automation, strengthening the IT landscape for small businesses.