NEWS
Security fears stop firms using cloud computing services
  • Posted on 19th February 2015 in by Phil Alsop

New research from the Federation of Small Businesses (FSB) has found that despite three fifths (60%) of small firms questioned using cloud computing services, the remaining two fifths (38%) remain sceptical about the benefits of the technology in the face of perceived risks.

Read More
 Privileged Identity Management for Big Data
  • Posted on 19th February 2015 in by Phil Alsop

Centrify Corporation has launched what it says is the industry’s first privileged identity management solution for Apache Hadoop-based big data infrastructures, as well as partnerships with industry-leading big data vendors Cloudera, Hortonworks and MapR Technologies. 

Read More
Check Point acquires Hyperwise
  • Posted on 19th February 2015 in by Phil Alsop

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before they happen.

Read More
Wick Hill gains Cyber certification
  • Posted on 19th February 2015 in by Phil Alsop

Wick Hill has gained the recently launched Government Cyber Essentials certification. The Cyber Essentials Scheme is part of the UK Government’s National Cyber Security Strategy and provides an independent assessment of the essential security controls that organisations need to have in place...

Read More
NEWS
Digital Guardian launches Digital Guardian 7.0 for data protection 'inside and out'

Digital Guardian has launched Digital Guardian 7.0, which extends the functionality of the patented...

Read More
IT consultancy expands service offering with acquisition

One of Wales’ leading IT consultancies has acquired an experienced Sage solutions provider,...

Read More
NEWS
Protecting gaming customers from DDoS attacks

Los Angeles Dedicated (LAD), a cloud and Infrastructure-as-a-Service provider with a strong focus...

Read More
Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat...

Read More
Dynamic responses to wireless threats

For the organisations that need it most, AirMagnet Enterprise provides nonstop detection, location,...

Read More
NEWS
IoT to have massive impact, but few companies have a plan in place

More than 40 percent of organizations expect the Internet of Things (IoT) to transform their...

Read More
Adapt celebrates Cyber Essentials PLUS certification

Adapt stands out from the crowd during Cyber Essentials assessment.

Read More
NEWS
Dell provides public access Wi-Fi provider The Cloud with network security solutions

Dell ensures performance of Wi-Fi service in public places such as Wagamama, Pizza Express and...

Read More
NEWS
A single data protection law for Europe - what does it mean?

EU Parliament has announced that wants single data protection law in place by end of 2015. This...

Read More
NEWS
Cybersecurity hub promises single standards database

The hub will be the first of its kind, enabling companies to quickly scope, define and maintain all...

Read More

Videos

Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Ciaran Flanagan, Global Head of Data Center Solutions at Siemens, explains the decision for Siemens Smart Infrastructure to open a data centre technology hub in the Iberian region, before going on to discuss...

Expert Opinions

By Straightline Consulting’s Managing Director, Craig Eadie.
By Rob Hankin, Chief Technology Officer at Cybit.
By Stig Martin Fiska, Global Head of Cognizant Ocean.