Check Point launches World Cyber Threat Map
  • Posted on 30th April 2015 in by Phil Alsop

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More
Legacy solutions failing to prevent attacks
  • Posted on 27th April 2015 in by Phil Alsop

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks...

Read More
Know your enemy: Why it is important to think like a cyber attacker in order to keep your data secure
  • Posted on 27th April 2015 in by Phil Alsop

By Erik Driehuis, VP EMEA, Digital Guardian.

Read More
Fat lady sings as Dell transforms the Royal Opera House's IT infrastructure
  • Posted on 23rd April 2015 in by Phil Alsop

Full end-to-end IT deployment from the desktop to the data centre.

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make...

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More
CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More
FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More

Videos

In this video, DCS talks to Mark Acton, DCA at their 2025 10x10 Event
Liz Blackman, Chief Marketing Officer at Avantra, discusses the continuing importance of DEI, despite some recent ‘push back’, explaining the importance of women's perspectives in creating balanced...
Egli Kaja, Project Manager, BCS, describes his journey from professional footballer to data centre project management, as part of BCS’s Athlete Career Transition Programme, designed to address the data...
Helena Fagraeus Lundström, T.Loop CEO, explains how T.Loop designs, builds and operates Data Energy Centers®, realised “on the edge” in buildings with heating needs that match with Data Energy...

Expert Opinions

By Jesse Todd, CEO of EncompaaS.
Steve Clifford, director of data centres, EMCOR UK, explores the challenges of data centre demand and explains why with the right planning, engineering expertise, and risk management, retrofitting existing...