Cyber attacks reliant on privileged credential exploitation
  • Posted on 16th June 2014 in by Phil Alsop

CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials form the basis of each attack.

Read More
Zero Trust Environment Infrastructures and the role of the CIO
  • Posted on 16th June 2014 in by Phil Alsop

By Dr. Wieland Alge, Vice President and General Manager EMEA Barracuda Networks.

Read More
Policy optimiser closes costly ‘access gap’
  • Posted on 13th June 2014 in by Phil Alsop

FireMon has announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.

Read More
Major reorganisation at Wick Hill
  • Posted on 13th June 2014 in by Phil Alsop

New Training Centre and new Professional Services Manager role at Wick Hill, as the VAD provides the framework for more growth.

Read More
Forensic Risk Alliance appoints Becky Stones and Rob Mason as partners

Forensic Risk Alliance (FRA) offers dedicated support for the forensic investigation, remediation...

Read More
Imperva releases Hacker Intelligence Initiative Report

Research reveals that 80 percent of comment spam traffic is generated by 28 percent of attackers.

Read More
ISACA names Matthew S. Loeb as CEO

ISACA, a global professional association serving 115,000 information systems assurance, security,...

Read More
Databarracks leads by example with new Cyber Essentials Scheme

Databarracks has been named as one of the first organisations in the UK to become certified with...

Read More
IT professionals expect the Internet of Things to significantly impact the workplace

Eighty-six percent of IT professionals believe the influx of connected “things” will...

Read More
Why Immersive Training works

By Scott Greaux, VP of product management and services at PhishMe.

Read More
Reputation more important than cost of fines

Despite 71% believing UK data protection laws should be stronger, 53% still admit to sending...

Read More
Kaspersky Lab now brings advanced protection to 42 per cent more of the virtualisation market

Kaspersky Lab has announced its latest virtualisation security solution, Kaspersky Security for...

Read More
Greater cloud education and awareness of cyberthreats needed in the UK, claim industry authorities

A panel of IT experts and information security practitioners has advised more education is needed...

Read More
Beyond cost, IT infrastructure rationalization and cloud are hurdles for retailers

Improving customer experience could bring more sales, a better reputation and a higher market share.

Read More
LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein....

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...
At Data Centre World Frankfurt 2025, we spoke with Lance Liu from Kstar about the company’s participation in the event and its role in the data centre sector. Watch the full interview to hear what he had...
Tom Glover discusses the findings of the company’s recent Q1 2025 EMEA Data Centre Report, which reveal potential challenges around tariffs and wider geopolitical tensions, power constraints and demand...
We caught up with Matthias Haymoz from SDEA at Data Centre World Frankfurt 2025 to hear about the company’s presence at the event and their role in the data centre landscape. Watch the full interview to...

Expert Opinions

By Sebastian Murphy, Technical Director - Data Centers EMEA, blu-3, Shaheed Salie, Technical Manager, blu-3, and Warren McTackett, blu-3.
By Darren Watkins, Chief Revenue Office at VIRTUS Data Centres.