Technology is only half of the battle for GDPR compliance
  • Posted on 23rd September 2016 in by Phil Alsop

Businesses must not forget the importance of culture as the General Data Protection Regulation comes into force.

Read More
IoT devices increasingly used to carry out DDoS attacks
  • Posted on 23rd September 2016 in by Phil Alsop

Symantec has revealed new research demonstrating how cybercriminal networks are taking advantage of lax Internet of Things (IoT) device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners.

Read More
BeyondTrust introduces free API for password management
  • Posted on 22nd September 2016 in by Phil Alsop

Offers developers flexibility and security by eliminating hard-coded passwords.

Read More
Cloud Distribution appointed as A10 Networks’ approved training partner
  • Posted on 22nd September 2016 in by Phil Alsop

Cloud Distribution, a next generation value-added distributor specialising in security, networking and storage, has been approved to deliver training on behalf of A10 Networks across EMEA.

Read More
ThreatConnect adds orchestration to its intelligence platform

With orchestration, ThreatConnect customers may bridge security teams, tools, processes,...

Read More
Helping to secure the Everywhere Perimeter

Avaya is announcing a new foundation approach to network security that aims to reduce the growing...

Read More
NEWS
Malware mayhem

Phishing attacks continue to rise in volume and impact in 80 percent of businesses surveyed, with...

Read More
NEWS
Data breaches up 15% and compromised data records up 31%

Identity and personal data theft account for 64% of all data breaches.

Read More
Ping and Microsoft partner

Ping Identity is working with with Microsoft to deliver integrations that extend the value of...

Read More
NEWS
Cyber security rises to the top of the boardroom agenda

Cyber security is now considered to be an executive responsibility, with 54% of CEOs in European...

Read More
BAD for AWS!

LightCyber, provider of Behavioural Attack Detection solutions, has introduced new Magna products...

Read More
Survey finds security is the top IT priority

Top business priority is improving efficiency.

Read More
BeyondTrust expands Cloud offerings

Amazon Marketplace edition brings flexibility and security to cloud environments.

Read More
CyberArk expands global Channel Partner Programme

Access to new training and technical sales tools enhance partners’ privileged account...

Read More
NEWS
Over two-thirds of businesses at risk over new EU data protection laws

43% of businesses put customer privacy at risk by failing to anonymise test data.

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Manvinder Singh, VP of Product Management for AI at Redis.