Companies need to stop divorcing themselves from cyber security
  • Posted on 27th January 2015 in by Phil Alsop

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either...

Read More
Proofpoint Security Suite innovations provide lifecycle defence against advanced threats
  • Posted on 27th January 2015 in by Phil Alsop

Advancements block more threats, detect new threats faster, automate response and reduce attack impact.

Read More
Industrial Internet of Things will boost economic growth
  • Posted on 26th January 2015 in by Phil Alsop

Workforce of the future to benefit from new digital technologies.

Read More
University IT rated best in world with new award
  • Posted on 26th January 2015 in by Phil Alsop

The University of St Andrews is seeing stars after being awarded a top honour for its IT provision.

Read More
New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how...

Read More
Fujitsu helps put digital first in Britain’s schools and colleges

New initiative aims to break down barriers to the use of technology in education and kicks off with...

Read More
Tough choices ahead for cash-strapped IT departments in 2015

Aging laptop and desktop environments and end of life software challenges drive budget...

Read More
IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled...

Read More
Security on the shelf

A report about wasteful spending.

Read More
Rouse protects employees from spear-phishing with Mimecast cloud email security

IP firm upgrades defences against rising volume of sophisticated phishing attacks.

Read More
Insiders pose the major threat

Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on...

Read More
OPSWAT acquires email security provider Red Earth Software

OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect...

Read More
Enterprise Immune system chosen for maritime insurance industry

DNK, a major insurance company for the shipping industry, has selected Darktrace’s Enterprise...

Read More
Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading...

Read More
The Vollrath Company selects SimpliVity OmniCube Hyperconverged Infrastructure

Global manufacturer benefits from cost savings and operational efficiency through unsurpassed...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
DCW Asia 2025 - Part 1 of 3

Expert Opinions

By Terry Storrar, managing director, Leaseweb UK.
By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.