Playing it safe in the Cloud

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell,...

Read More
ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More
Skyhigh reveals Pervasive Cloud 'secrets'

 Skyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.

Read More
Rapid7 introduces Nexpose 6.0 with adaptive security

Rapid7, Inc. has released Nexpose 6.0 featuring Adaptive Security, a new capability that will help organisations respond more effectively to evolving security risks. The enhanced solution for Threat Exposure Management delivers prioritised insight into changes on your network and the impact...

Read More
Trustwave and Palo Alto Networks forge Managed Security Services pact

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation...

Read More
ANSecurity and Pulse Secure partner to offer leading industry secure access solutions

Leading network security firm ANSecurity has been awarded key partner status with secure access...

Read More
The Internet of Things Security Foundation has launched  

Welcomes new members to drive IoT security excellence.

Read More
Protecting your business against a DDoS attack  

By Wieland Alge, VP and GM, EMEA at Barracuda Networks.

Read More
Gartner says the future of the data centre Is software-defined

The software-defined data centre (SDDC) is crucial to the long-term evolution of an agile digital...

Read More
BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a...

Read More
Dell launches Dell One Identity Manager 7.0

New release delivers an even more modular and scalable approach to identity and access management...

Read More
Pulse Secure signs WestconGroup

Pulse Secure, a leader in access and mobile security solutions to enterprise and service providers,...

Read More
Tripwire introduces three new Tripwire apps  

Industry leader delivers add-on tools to improve workflow efficiency.

Read More
Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and...

Read More

Videos

Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...
In this conversation, Bill Andrews, President and CEO of ExaGrid, discusses how Tiered Backup Storage is helping MSPs improve performance, strengthen ransomware protection, and scale efficiently. He explains...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...

Expert Opinions

By Louis Charlton, CEO of Global Commissioning.
By Brian O’Hare, Service Director at BCS Consultancy.
By Andrew Sedman RCDD, Head of Technical Support & Training, Reichle & De-Massari AG.
By Kate Steele, Director, EMEA HPC/AI at Lenovo Infrastructure Solutions Group.