Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of attackers.

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
IT teams and the C-suite must work together to deliver comprehensive cyber-security

Cyber-security is rarely out of the news these days, with large businesses and organisation under attack. This is now increasingly moving to medium-sized organisations, who are also seeing their capital, reputation and intellectual property challenged by new and insidious threats. However,...

Read More
Thales strengthens its multi-cloud data security portfolio

New encryption, tokenisation and key management capabilities simplify control and ensure...

Read More
Neustar introduces Integrated Security Platform

Neustar has introduced its new Integrated Security Platform, continuing to help organizations...

Read More
Businesses must be savvy to mobile security threats as app adoption spikes

Introducing adequate security into the software’s design at the initial building stage is crucial.

Read More
NETSCOUT enters the advanced threat Market

NETSCOUT ISNG platform and Arbor Networks Spectrum delivers smart data and analytics.

Read More
ForeScout partners with ServiceNow

ForeScout Extended Module for ServiceNow provides visibility and configuration monitoring for...

Read More
NEWS
Employees regarded as an organisation's greatest asset but also one of the biggest data security risks

What's keeping IT professionals awake at night? Data storage, data access and data sharing.

Read More
NEWS
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according...

Read More
CIF enhances its Code of Practice to support GDPR compliance for CSPs

CIF provides the only certification for CSPs who want to better position themselves as GDPR ready.

Read More
NEWS
Consumers confused about encryption back doors

Sixty-five percent believe they shouldn’t be forced to hand over encrypted private data to...

Read More
69% of UK boards neglect GDPR compliance

IT decision-makers report inadequate levels of sponsorship from the C-suite despite the General...

Read More
Telehouse now offering Verisign DDoS Protection Services

Telehouse is now offering Verisign’s Distributed Denial of Service (DDoS) Protection Services...

Read More

Videos

Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Johan van Hover, Business Manager at Arteco Coolants, outlines the company’s history as a joint venture between Chevron and TotalEnergies and its reputation for high performance coolant technologies,...
Dr Poh Seng (PS) Lee, Professor and Head of Mechanical Engineering at the National University of Singapore (NUS) and Executive Director of the Energy Studies Institute (ESI), previews his involvement with the...

Expert Opinions

By Manuel Sanchez, Information Security and Compliance Specialist, iManage.
By Dave King, Product Engineering Architect at Cadence.
By Pascal Lemasson, AVP Business Development and Sales - Europe at MediaTek.
By Kirsty Paine, Field CTO & Strategic Advisor, Splunk.