NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a cyberattack. By David Emm, principal security researcher, Kaspersky Lab.

Read More
NEWS
Why a data breach doesn’t have to mean data loss

Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric cyber security strategy can help prevent data loss, even in the event of a breach.

Read More
NEWS
The tumultuous relationship between data and security

Our daily news updates have become littered with data breach after data breach, each costing...

Read More
NEWS
Taking the long view – why threat hunting should underpin strategic IT security

The US Navy SEALs have a well-known motto: “The only easy day was yesterday.” Taking a look at...

Read More
NEWS
How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years...

Read More
NEWS
Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the...

Read More
NEWS
Securing your company’s supply chain with objective information

Understanding the risk posed by third- and fourth-party companies can help mitigate security...

Read More
NEWS
Indecent exposure: could Wi-Fi be your weakest link?

Greig Schofield, Technical Manager at Netmetix, explores how Wi-Fi could expose your business –...

Read More
NEWS
Top Ten Cybersecurity Predictions for 2019

By Ian Kilpatrick, EVP Cyber Security, Nuvias Group.

Read More
NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

News

A new survey reveals the hidden costs of AI-generated outputs, suggesting that without proper infrastructure and training, productivity gains may falter.
SUSE partners with Amazon Web Services for the European Sovereign Cloud, aiming to address sovereignty concerns with open source solutions.
European broadband standards aim to lower energy use in homes, with potential savings comparable to small data centres or mid-sized cities.
IBM introduces AI ready sovereign software designed to help organisations manage digital environments under evolving regulatory requirements.