Releasing your inner innovator

The role of the IT Director is changing. Having fought for years to gain a seat on the board, with mixed success, the inevitable shift of IT infrastructure to the cloud finally presents the IT Director with a chance to fundamentally change the role and deliver true strategic innovation. Removing...

Read More
Gloucestershire County Council selects Steria

Steria will help to drive efficiencies within Gloucestershire County Council’s ICT infrastructure under an innovative contract which will deliver savings in excess of 25% over current costs, whilst giving the Council the flexibility to respond effectively to changing demands in future.

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
Tech Data promotes Andy Gass

Tech Data says that Andy Gass will become Managing Director UK and Ireland, after spending the past...

Read More
Lancope introduces StealthWatch Labs security updates

Security updates from Lancope’s research team help customers combat today’s...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...

Read More
AlgoSec partners with Qualys

New integration delivers application-centric vulnerability management, aggregating and scoring...

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
Das Netzwerk als Business Enabler:Cloud-basierte Sicherheitslösungen machen’s möglich

Internetsicherheit ist in den letzten Jahren immer mehr zu einem beweglichen Ziel geworden. Das...

Read More

Videos

Rishi Kapoor, WW Partner Sales Engineering Leader at Alteryx, shares how Alteryx One and the Partner SE model enable MSPs to transition from infrastructure management to high-value data and AI services. From...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
In this interview, Kristen Knight, newly appointed VP of Channel Sales at Portnox, discusses the launch of the company’s global partner programme and its cloud-native, passwordless approach to network access...

Expert Opinions

By Fiona Reid, Director of International Business at Pattern
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
By Samantha Jennings, Head of Operations, Avella.
By Darren Ellis; Managing Director, EMEA, Park Place Technologies.