Enventis brings added services and security to its cloud
  • Posted on 27th June 2014 in by Phil Alsop

Adding services such as data protection and secure cloud Wi-Fi means the company can offer its customers added value over and above the provision of brute resources

Read More
Agiliance pumps up its Big Data risk management tools
  • Posted on 26th June 2014 in by Phil Alsop

Risk assessment specialist adds latest NIST Checklist and Best Practice pack as well as interoperability with CrowdStrike Falcon Intelligence

Read More
The future of cloud is small, lots of small
  • Posted on 25th June 2014 in by Phil Alsop

CSW Editor, Martin Banks, speculates on what may well come from a trend spotted by Tibco CTO, Matt Quinn

Read More
Mimecast adds critical security for Office 365 porting 
  • Posted on 25th June 2014 in by Phil Alsop

Porting on-premise Microsoft applications to even a Microsoft cloud can be scary, so some assistance is often welcome

Read More
Getting intelligent about threats

Emerging Threats is now making it threat intelligence database portal service, IQRisk Query, widely...

Read More
 Don’t score an own goal with security

  Graham Welch, EMEA Managing Director with Cisco, raises the issues that with security, a...

Read More
Joining up security across IT and OT

As the cloud brings IT and OT ever-closer together, trapping security threats that span both is...

Read More
Built.io `democratises innovation’

Raw Engineering’s new development tool speeds DevOps and throws in security

Read More
Domino’s hack lesson - encrypt

Domino’s brings out the standard calls and advice for security experts, plus a tinge of...

Read More
Infonetics report shows DDoS growing well

The US market research firm has just given out a taster of the results from its biannual survey of...

Read More
Getting ahead of Heartbleed and CrytoLocker

The idea of businesses using proactive security measures that can prevent attacks from the likes of...

Read More
Skyhigh approves 50 CSPs as `enterprise ready’

Company aims to provide users with objective assessment of the business practices, security and...

Read More
IRM guide says no substitute for risk planning

Against increasingly `warlike’, state-sponsored cyber attacks, the emergence of insurance...

Read More
Don’t protect against hack by being hacked

According to security firm, BullGuard, there is now a phishing spree underway trying to fluke users...

Read More
Simple words of advice from IET

Even tech-savvy employees can fall into the trap of assuming security just `happens’, so the...

Read More

Videos

Welcome to the WinStar Introductory Presentation!
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Orla Daly, Chief Information Officer at Skillsoft.
By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
By Rohan Vaidyanathan - Vice President, Content Intelligence, Hyland.