NEWS
McAfee Labs finds mobile apps left vulnerable for months
  • Posted on 25th February 2015 in by Phil Alsop

Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of the mobile threat landscape and the failure of mobile app developers to patch critical secure sockets layer (SSL) vulnerabilities, potentially impacting millions of mobile phone users. McAfee Labs...

Read More
NEWS
Enterprise IT is losing control over business data
  • Posted on 24th February 2015 in by Phil Alsop

Survey of IT decision makers collectively managing more than 250,000 users finds that as the ‘Dropbox problem’ grows IT is concerned, yet inactive.

Read More
NEWS
Five key IT security trends for 2015
  • Posted on 23rd February 2015 in by Phil Alsop

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at five key IT security trends and solutions for 2015.

Read More
NEWS
Security fears stop firms using cloud computing services
  • Posted on 19th February 2015 in by Phil Alsop

New research from the Federation of Small Businesses (FSB) has found that despite three fifths (60%) of small firms questioned using cloud computing services, the remaining two fifths (38%) remain sceptical about the benefits of the technology in the face of perceived risks.

Read More
 Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity...

Read More
Check Point acquires Hyperwise

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...

Read More
Wick Hill gains Cyber certification

Wick Hill has gained the recently launched Government Cyber Essentials certification. The Cyber...

Read More
NEWS
Digital Guardian launches Digital Guardian 7.0 for data protection 'inside and out'

Digital Guardian has launched Digital Guardian 7.0, which extends the functionality of the patented...

Read More
IT consultancy expands service offering with acquisition

One of Wales’ leading IT consultancies has acquired an experienced Sage solutions provider,...

Read More
NEWS
Protecting gaming customers from DDoS attacks

Los Angeles Dedicated (LAD), a cloud and Infrastructure-as-a-Service provider with a strong focus...

Read More
Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat...

Read More
Dynamic responses to wireless threats

For the organisations that need it most, AirMagnet Enterprise provides nonstop detection, location,...

Read More
NEWS
IoT to have massive impact, but few companies have a plan in place

More than 40 percent of organizations expect the Internet of Things (IoT) to transform their...

Read More
Adapt celebrates Cyber Essentials PLUS certification

Adapt stands out from the crowd during Cyber Essentials assessment.

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer at Salute.
By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Haris Pylarinos, Founder and CEO of Hack The Box