Positive Technologies opens Swedish office

Positive Technologies, a global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection, has opened an office in Sweden. In addition, the company confirmed the appointment of Johan Nordstrom as VP,...

Read More
NETSCOUT launches Business Assurance lineup for enterprise

Service assurance and security solutions to accelerate Digital Transformation.

Read More
Dell teams with Securonix

Technical integration between Dell Change Auditor and Securonix offers customers a deeper level of analysis into user and administrative changes to Microsoft Active Directory, Exchange, and file server activities.

Read More
UK businesses must continue plans for compliance with the GDPR, despite Brexit

Organisations will have to adhere to the GDPR, or equivalent terms, in order to remain competitive within the marketplace.

Read More
Clavister signs distribution agreement with IT Partners Security for Polish market

Partnership will see IT Partners Security distribute Clavister's full range of network security...

Read More
Ransom driven DDoS attacks on the rise in Europe

IT security industry calls for Internet Service Providers to take a larger role in protecting...

Read More
Business travellers are more likely to be robbed of their data than their travel money

Kaspersky Lab’s latest report shows business travellers are more likely to be mugged of valuable...

Read More
CyberArk announces changes to board of directors

Udi Mokady elected chairman; Gadi Tirosh named lead independent director.

Read More
Dell bolsters channel program

New loyalty program rolled out to incentivise resellers for purchases through distributors.

Read More
Wick Hill and Zycko become part of Nuvias Group

Wick Hill and Zycko will now be known as ‘Wick Hill, a Nuvias group company’ and ‘Zycko, a...

Read More
A fifth of UK businesses do not understand data protection requirements

European survey reveals lack of understanding about data protection requirements despite access...

Read More
Almost one-third of cyber security professionals admit to cheating on audits

Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.

Read More
Open standard for Cloud-based digital signatures

New industry consortium to pioneer open digital signatures for mobile and web

Read More
Gartner identifies security top ten

Gartner has highlighted the top 10 technologies for information security and their implications...

Read More
Survey focuses on cyber weapons

LightCyber has published the results of its Cyber Weapons Report 2016, a first-of-its-kind...

Read More

Videos

Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...
Keith Norman, Chief Marketing & Sustainability Officer of Lyten, explains the reasons behind the company’s acquisition of Northvolt’s battery assets in Sweden, with the site expected to resume operations...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Stewart Hunwick, Field CTO, Storage Platforms and Solutions, Dell Technologies.
Why visibility into supporting operational systems matters just as much as protecting core IT.