Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec Messaging Gateway, network threat protection for Mac.

Read More
Splunk turns to Ping Identity

Splunk has selected Ping Identity to provide its customers with simple and secure access to the Splunk customer portal.

Read More
Powering the Cloud celebrates in style

Continues to be the must-attend pan-European event for storage, virtualisation, big data, cloud and...

Read More
Microsoft unveils state-of-the-art Cybercrime Center

Centre of excellence to help defend online safety worldwide.

Read More
IBM to acquire Fiberlink Communications

IBM has announced a definitive agreement to acquire Fiberlink Communications, a mobile management...

Read More
Dell SecureWorks launches Server Protection Services

Dell SecureWorks now provides Server Protection Services for physical, virtual and cloud-based...

Read More
How important is data centre security?

By Bill Walsh, Operations Manager of City Lifeline.

Read More
Trustwave adds to managed security offering

Trustwave has announced new and enhanced managed security services designed to help businesses...

Read More
FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster...

Read More
Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level...

Read More
Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The...

Read More
Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary...

Read More
Information security and risk management holding back UK business innovation

Concerns over security and risk stop project or business ideas progressing in nearly half of all...

Read More

Videos

Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, discusses the current business continuity and disaster recovery landscape.

Expert Opinions

Nick Rogers, CEO of Exacta Technologies, explores the growing importance for businesses to prioritise on-premises over cloud storage in not only reducing hefty management costs but to ensure complete control...
By Kiva Kolstein, President and Chief Revenue Officer at AlphaSense.
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...