Mehr als 40 Prozent der deutschen Unternehmen setzen sich Risiken durch BYOD aus

Studie von Acronis findet heraus, dass Unternehmen mit Richtlinien zu BYOD, einfachen Sicherheitsmaßnahmen und Mitarbeiterschulungen zu nachlässig umgehen

Read More
One of the UK’s largest health service providers goes live with newly re-designed secure infrastructure

Trustwave says that one of the largest health service providers in the United Kingdom, Southern Health NHS Foundation Trust, has deployed security information and event management (SIEM) and content security technology from Trustwave as part of a complete overhaul of its existing IT security...

Read More
Ping Identity raises $44 million

Ping Identity®, The Identity Security Company™, has closed a $44 million investment round led by W Capital Partners and DFJ Growth with participation from existing investors—General Catalyst Partners, Draper Fisher Jurvetson, Volition Capital Partners, Triangle Peak Partners, SAP...

Read More
SafeNet partners with Senetas

SafeNet, Inc. has announced an extended global distribution agreement with Senetas Security Pty Ltd., in which SafeNet will add Senetas’s high-speed network encryption solutions, including the new CN6000 family, to its portfolio of products distributed around the globe.

Read More
Huddle strengthens its reseller Channel

Huddle is expanding the delivery of next generation content collaboration services across the UK...

Read More
Business Transformation increases Attack Surface

Data security consultancy offers seven steps to a successful transition to Cloud and Mobility...

Read More
StealthWatch for ‘enhanced’ threat detection

StealthWatch 6.4 features new levels of network visibility and security intelligence for improved...

Read More
If You Get Your Security Right, Big Data Can Work For You

By Dave Anderson, Senior Director, Global Strategy and Marketing, Voltage Security.

Read More
Cyber attacks can take months to control even after detection

Advanced cyber attacks being made by state-sponsored cyber terrorists can take months to control...

Read More
Trotz strenger Vorschriften zur Aktenaufbewahrung agiert jedes dritte europäische Unternehmen nur wenig systematisch

Europaweiter Leitfaden von Iron Mountain und der Anwaltskanzlei De Brauw Blackstone Westbroek soll...

Read More
IT-Verfügbarkeit: Das Problembewusstsein der Verantwortlichen bleibt ausbaufähig

Eine Studie konnte belegen, dass IT-Ausfälle bei größeren mittelständischen...

Read More
IT transformation tops UK CIO Agenda

Research from SunGard Availability Services reveals plans for technology refresh in the next 36...

Read More
The Marine Institute discovers greater functionality

Varonis has revealed details of its work with the Marine Institute. With a primary objective to...

Read More
Double coup for Softcat with advanced Symantec Master Specialist certifications

Softcat has achieved its most advanced Symantec accreditations yet in a leap which cements its...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Martin Jakobsen, Managing Director, Cybanetix
By Cody David. Head of AI and Innovation. Syniti - part of Capgemini.
By Eric Herzog, Chief Marketing Officer at Infinidat.
By Eric Herzog, Chief Marketing Officer at Infinidat