NEWS
Highly effective CISOs in short supply?

Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner CISO Effectiveness Index, according to a survey by Gartner, Inc.

Read More
NEWS
Beware outbound email data breaches

Research by Egress reveals organisations suffer outbound email data breaches approximately every 12 working hours.

Read More
NEWS
Cyber deception reduces data breach costs

Attivo Networks has published the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.” The paper identifies the direct and measurable financial and productivity benefits of deception...

Read More
NEWS
Red tape restricts industrial cybersecurity initiatives

The recent Kaspersky report ‘State of Industrial Cybersecurity in the Era of Digitalisation’ has revealed the main barriers that inhibit or delay implementation of industrial cybersecurity projects. The most common obstacles include the inability to stop production (34%), and bureaucratic...

Read More
NEWS
Insider threat partnership

Joint solution integrates detection, automated investigations and incident response capabilities to...

Read More
NEWS
Dramatic rise in e-crime activity

Falcon OverWatch 2020 Mid-year report provides insights into massive uptick in intrusion activity...

Read More
NEWS
Phishing - the most vulnerable sectors and departments

Cyber attacks cause great harm to the business world due to their evolving nature and it is...

Read More
NEWS
Internal security failures pose biggest cyber risk to businesses

837 security tests carried out on 353 businesses found that firms are extremely susceptible to...

Read More
NEWS
ThreatConnect acquires cyber risk quantification pioneer Nehemiah Security

Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the...

Read More
NEWS
People-centric DLP

Proofpoint has introduced multiple new Proofpoint innovations to ensure that organizations...

Read More
NEWS
Once more unto the breach

Nine out of ten IT professionals have experienced a data breach – with four out of five concerned...

Read More
NEWS
IT admins feel under equipped when it comes to remote working security

Shadow IT and a lack of business continuity planning present growing threats.

Read More
NEWS
People-centric protection

The combined solutions allow organisations to contain and remediate attacks against privileged...

Read More
NEWS
Nozomi delivers OT and IoT security via the Schneider Electric Exchange

Schneider Electric customers get faster access to cybersecurity expertise alongside the...

Read More
NEWS
Half of organisations exposed to data security risk in new world of work

One in two (53%) organisations are exposed to undue data security risk thanks to current procedures...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, explains how storage can improve an enterprise’s environmental footprint.
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

Pulsant’s Natasha O’Brien explains why a resilient and sovereign digital infrastructure could represent the answer to escalating insurance costs.
By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By Stuart Farmer, Sales Director at Mercury Power.