iomart Group plc selects Arbor Networks’ Peakflow® SP Platform

iomart Group plc, one of Europe’s leading providers of complex managed and cloud hosting services, has selected the Arbor Peakflow® SP platform in order to protect its infrastructure from distributed denial of service attacks that are the primary threat to the availability of their...

Read More
Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme designed to enhance the cyber security of many of our everyday technologies and tools by ensuring that the software that underpins them is more trustworthy.

Read More
‘X-Ray’ vision into firewall configurations and network traffic

Newest enhancement to WatchGuard Dimension visibility solution allows admins to see policy misconfigurations and optimise traffic.

Read More
Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd....

Read More
Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the...

Read More
King’s College Hospital uses Netwrix Auditor to secure ICT network

Netwrix helps London hospital to improve security of 10,000-plus user network and provide full...

Read More
Intel unveils new developer tools for future technologies

Intel Corporation CEO Brian Krzanich kicked off Intel's annual technical conference with a...

Read More
OpenStack revenue expected to hit $3.3 billion by 2018

The market for OpenStack-related products and services will quadruple in size between the end of...

Read More
Global survey finds 85% of mobile apps fail to provide basic privacy information

A survey of over 1,200 mobile apps by 26 privacy regulators from across the world has shown that a...

Read More
Cyber attack complexity leaves many organisations exposed

As new cyber attacks continue to emerge, 48 percent of IT security professionals admit they are not...

Read More
Big business decisions driven by gut instinct as well as gigabytes

Business leaders are taking major strategic decisions about the future of their businesses based on...

Read More
Turning the tables on cyber attackers

New RSA® Advanced Security Operation Center Solution arms security teams with new tools to help...

Read More
Advancing threat analytics

Targeted data analytics provides faster time to attack detection over Big Data approach.

Read More
Biometrics can be an alternative to conventional authentication technologies in mobiles

The number of global biometrics smartphone users is expected to reach 471.11 million in 2017 from...

Read More

Videos

Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Welcome to the WinStar Introductory Presentation!

Expert Opinions

Networking as a Service (NaaS) is gaining traction - but is it right for every organisation? In this two-part series, Cloud Gateway's Chief Product Officer Justin Day cuts through the hype to explore its...
By Andrew Dodd, HPE Storage Worldwide Marketing Communications Manager, the LTO Program.
By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
By Rohan Vaidyanathan - Vice President, Content Intelligence, Hyland.