NEWS
Tech Data to offer Malwarebytes cybersecurity solutions
  • Posted on 9th April 2019 in by Phil Alsop

Agreement provides customers with access to leading ‘Endpoint Protection and Response’ cybersecurity solution.

Read More
NEWS
84% of UK CIOs and CISOs hold back from making critical updates to keep the business running
  • Posted on 7th April 2019 in by Phil Alsop

Latest Tanium research highlights the IT security and operational trade-offs that UK CIOs and CISOs face in protecting their business from disruption.

Read More
NEWS
Collision of privacy, cybersecurity and compliance
  • Posted on 7th April 2019 in by Phil Alsop

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More
NEWS
Privacy concerns grow
  • Posted on 7th April 2019 in by Phil Alsop

Nearly three out of four Brits are more alarmed than ever about their privacy, but many are willing to accept risks to make their lives easier.

Read More
NEWS
Report focuses on insider threats

Bitglass, the Next-Gen CASB company, has just released Threatbusters, its 2019 Insider Threat...

Read More
NEWS
Safeguard your business from evolving malware attacks

Barracuda researchers have uncovered an alarming new rise in the use of document-based malware. A...

Read More
NEWS
Aqua Security closes $62m in funding

Led by Insight Partners, the investment round will enable Aqua to expand its platform and market...

Read More
NEWS
Financial institutions fail to protect mobile apps

Research highlights a systemic failure to protect financial services apps against multiple...

Read More
NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate...

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’...

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now...

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
DCW Asia 2025 - Part 3 of 3

Expert Opinions

By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx