Cloud security best practice
  • Posted on 18th August 2014 in by Phil Alsop

By Andrew Tang at MTI.

Read More
How to implement the US Cybersecurity Framework
  • Posted on 18th August 2014 in by Phil Alsop

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical...

Read More
IL3 accreditation
  • Posted on 18th August 2014 in by Phil Alsop

Platform securely bridges access between IL2 and IL3 data while providing connectivity to the Public Services Network.

Read More
Security breaches can go undiscovered for weeks
  • Posted on 13th August 2014 in by Phil Alsop

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More
Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still...

Read More
IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare...

Read More
Big Data event to showcase opportunities for business

A national provider of IT infrastructure is staging an event in the Sheffield City Region to show...

Read More
Network monitoring solution heals network ailments at The Cambridge School of Clinical Medicine

The School of Clinical Medicine will implement WhatsUp Gold network monitoring solution from...

Read More
SecureAuth first to deliver risk analysis combined with multi-factor authentication and single sign on in one solution

SecureAuth Corporation has launched SecureAuth IdP 8.0, the first access control solution that...

Read More
Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in...

Read More
Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...

Read More
Check Point introduces 13800 and 21800 data centre security gateways

Gateways deliver high throughput for demanding workloads, with multi-layered security.

Read More
The Snowden Wasteland

By Calum MacLeod, VP of EMEA at Lieberman Software.

Read More
New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256...

Read More
Serco secures new European Medicines Agency ICT contract

Serco has secured a new contract to continue providing information and communications technology...

Read More

Videos

In this video, we talk to FlaktGroup at the DCA's 10x10 2025.
Dame Dawn Childs, Chief Executive of Pure Data Centres, explains how the company’s belief that data centres can be the catalyst for urban regeneration, employment and positive environmental change is borne...
Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
Daniel Thorpe, JLL's Head of Data Center Research, EMEA, outlines the findings of the company’s new "The Future of Quantum Real Estate" report, which details how quantum computing is emerging as the next...

Expert Opinions

By Micah Heaton, Executive Director, Microsoft Security Centre of Excellence at BlueVoyant.
By Burley Kawasaki, Global VP of Product Marketing & Strategy, Creatio.
By Juan Colina, EMEA Data Centre & IT Segment Leader at Eaton.
By Isaac Douglas, Chief Revenue Officer at servers.com.