Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application security in the cloud for clckwrk customers.

Read More
Validation update

Login VSI, Inc. announces Login VSI 4.1, a substantial update to its flagship product. Login VSI is the industry-standard performance validation solution for centralized virtualized desktop and server-based environments. The new release, which has been tested in limited private beta since May 2014,...

Read More
IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK...

Read More
Integrated endpoint threat prevention, detection and response

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...

Read More
Securing your virtual environment

By David Phillips, product manager, Wick Hill.

Read More
PCI Compliance contributes to false sense of security

Tripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted...

Read More
Alert Logic announces security solutions for Google Cloud Platform

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More
OpenStack Summit heads to Europe

For the first time, the OpenStack® Summit is coming to Europe. The 10th OpenStack Summit will...

Read More
UKAS accredits Certification International for latest information security management standard

Certification International, a leader in the assessment and certification of international,...

Read More
375 million customer data records compromised in 2014

Identity theft main reason for breaches and survey shows 40 per cent of consumers very unlikely to...

Read More
New benchmarking studies reveal how users can get up to 60 per cent more performance from any existing infrastructure

Bare metal cloud provider Bigstep debunks a number of infrastructure myths, such as more CPUs equal...

Read More
Survey shows the role of IT is changing

KPMG LLP and ServiceNow have announced the results of a joint survey, shedding light on how IT...

Read More
Gartner says beware of the data lake fallacy

The growing hype surrounding data lakes is causing substantial confusion in the information...

Read More

Videos

Chris Derham, Business Development Director – Networks, Alcatel-Lucent Enterprise, discusses the company’s innovative generative AI chatbot, ALIE, which is available on a global scale for use by channel...
Chris Maloney, Managing Director of US Operations & Director of Business Development at VPIphotonics, discusses how photonic integrated circuits (PICs) have become an enabling technology in the rapid expansion...
In this video, DCS talks to Mark Acton, DCA at their 2025 10x10 Event
DCS talks to Legrand at the DCA's 2025 10x10 Event

Expert Opinions

Steve Clifford, director of data centres, EMCOR UK, explores the challenges of data centre demand and explains why with the right planning, engineering expertise, and risk management, retrofitting existing...
Adult skills expert, Kevin Vashi at Netcom Training will discuss why in times of crisis, UK businesses should prioritise the onboarding and training of cybersecurity professionals.
By David Brown, SVP International Business, FireMon.
By Francesco Fontana, Enterprise Marketing and Alliances Director at Aruba S.p.A.