Proofpoint cybersecurity predictions for 2015

2014 was a year in which information security vaulted into the public eye, driven by a surge in both the number and the visibility of data breaches and compromises. This new attention will bring greater scrutiny in 2015, just as the nature and severity of threats continue to evolve for the worst.

Read More
The identity and access management market in 2015

The Identity and Access Management (IAM) Market continues to grow, with analysts predicting a significant continued increase in spending from enterprises large and small. As 2014 draws to a close, we take a look at the key factors driving this investment and make our predictions for how the IAM...

Read More
Mobile ransomware, work-at-home fraud and horrid videos could claim new victims

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected...

Read More
Going beyond digital

Richard Potter, Group Innovation Director at Steria, offers his technology predictions for 2015 and...

Read More
IT managers’ toolkit: Guide to Managed Network Security

IT is a revolving door of change. While most industries have had to get on board with the digital...

Read More
In 2015 businesses will start to understand the importance of data classification

2015 predictions come from Bob Plumridge, EMEA CTO at HDS, and also chairman of SNIA Europe.

Read More
Survey Reveals 1 in 5 employees 'going rogue' with corporate data

According to SailPoint’s 7th Annual Market Pulse Survey, companies around the world have...

Read More
European survey finds use of Public Cloud Services continues to increase despite security concerns

A recent survey commissioned by Barracuda Networks, Inc., and conducted by Techconsult, highlights...

Read More
Media companies are investing in disruptive ICT technologies

Media companies are investing heavily in advanced information and communications technology (ICT)...

Read More
Tripwire and Check Point announce technology partnership and integration 

Collaboration provides real-time protection against undiscovered threats, zero-day and targeted...

Read More
Nuix joins McAfee® Security Innovation Alliance Program 

Nuix, a technology company that enables people to make fact-based decisions from unstructured data,...

Read More
Varonis helps Ipswich Hospital prevent a data haemorrhage

Varonis Systems, Inc. has helped Ipswich Hospital allow both internal and external access to...

Read More
Lancope® unveils enhanced, customer success organisation

Company has increased its investment in customer success by 150 percent in 2014.

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge