NEWS
Assessing the delicate cybersecurity “fire triangle”

A physical roaring fire and a digital cyberattack might not have much in common – but these very different forces leave a similar a trail of destruction in their wake. By Pat Krupa, Head of Product and UX, SmartFrame.

Read More
NEWS
How cloud service providers can plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA)...

Read More
NEWS
Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision makers surveyed for NTT Security’s 2019 Risk:Value report expect recovery to take nearly 100 days on average, double the figure of a year ago. They also believe they would lose more revenue as a...

Read More
NEWS
Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full visibility into their organisation’s sensitive data and where it resides, cyber attackers will take advantage. However, this is becoming increasingly difficult as enterprise data and applications move to the...

Read More
NEWS
Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with...

Read More
NEWS
Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More
NEWS
How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of...

Read More
NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...

Read More

Videos

Nirav Shah, Founder & Director of Technical Excellence at Infrassist, explains that 24x7 IT monitoring and defence is essential for SMBs as an often distributed workforce needs protection around the clock, not...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...
Data Centre World London 2026
Zeki Turedi, CrowdStrike Field CTO Europe, discusses the findings of the company’s 2026 Global Threat Report, which reveals that AI is accelerating the adversary and expanding the enterprise attack surface....

News

The “EnergAIzer” method generates reliable results in seconds, enabling data center operators to efficiently allocate resources and reduce wasted energy.
By integrating the Alteryx One platform, the Marine Conservation Society has enhanced its data processing, driving meaningful environmental initiatives.
KROHNE announces a major commitment to the fast-growing data center sector by dedicating a significant portion of its annual production capacity to meet escalating demand. This strategic move is designed to...
SonicWall has introduced the NSv XS, a subscription-based virtual firewall designed for small and distributed environments, offering enhanced security features and flexible deployment options across...