NEWS
Botnets and machine learning: a story of “hide and seek”

Malware authors have always been trying to update their software and evolve their techniques in order to take advantage of new technologies and bypass security measures. By Leonidas Plagakis, Security Engineer, RiverSafe.

Read More
NEWS
Five top tips for small businesses adopting encryption

Becrypt has been in the disk encryption business for more than 15 years and have carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time,...

Read More
NEWS
The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More
NEWS
When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free...

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of...

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage....

Read More
NEWS
Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the...

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the...

Read More
NEWS
Why have we become desensitised to cyber-attacks?

1989 was of a year of positive milestones which would have a profound impact on the way we live and...

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and...

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global...

Read More

Videos

Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...
Caroline Monfrais, Global VP Strategy & Transformation, Wipro Consulting, looks at, for all the talk around cohesive AI implementation strategy and the evolution of AI Agents, what needs to be done now so that...
Daniel Thorpe, JLL's Head of Data Center Research, EMEA, outlines the findings of the company’s new "The Future of Quantum Real Estate" report, which details how quantum computing is emerging as the next...

News

Inspired signs a significant CPPA with VIRTUS Data Centres and LID Windfarms to enhance sustainable energy solutions.
Vertiv unveils new PowerIT rack PDUs to cater to data-intensive workloads like AI and HPC, enhancing power management and ensuring data centre reliability.
STULZ introduces the CyberRack SideCooler, an innovative cooling solution designed for compact data centres with high heat loads.
Comms365 has appointed Rob Bartlett to enhance partner networks and expand channel sales, aligning with their advanced IoT solutions strategy.