How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical...

Read More
Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More
IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More
Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in...

Read More
Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...

Read More
IT budgets set to increase according to a third (37%) of financial services organisations

Survey of UK & Ireland financial services sector reveals companies are set to spend as...

Read More
New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256...

Read More
The Snowden Wasteland

By Calum MacLeod, VP of EMEA at Lieberman Software.

Read More
Integration of Symantec’s Certificate Intelligence Center (CIC) with A10 Thunder ADCs

Provides customers with on-demand status of critical security data to help keep on top of their...

Read More
Skyscape secures Cyber Essentials Plus Scheme

Skyscape Cloud Services Limited has successfully achieved certification for the Government’s...

Read More
South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace...

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc...

Read More
Voltage SecureData z/Protect provides reliable, standards-based protection of sensitive data on IBM mainframes

Voltage Security has announced significant enhancements to Voltage SecureData z/Protect™ that...

Read More
Kroll joins “Bit9 + Carbon Black Connect” Alliance Program

Kroll uses Carbon Black to rapidly detect and respond to attacks and accelerate remediation efforts...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

Expert Opinions

By CEO of Global Commissioning, Louis Charlton
By Haris Pylarinos, Founder and CEO of Hack The Box
By Chris Ackerson, SVP of Product at AlphaSense.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.