NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...

Read More
NEWS
Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done...

Read More
NEWS
GDPR and mitigating cyber-risk

For digital businesses across all industries and markets, there are a number of risks which freelancers and contractors may face as a result of the new regulations. Here, Janthana Kaenprakhamroy, founder of on-demand insurance provider Tapoly, discusses the ins and outs of GDPR and the risks...

Read More
Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More
Top Ten Tips to Ensure GDPR Success

By Mike Puglia Chief Strategy Officer at Kaseya.

Read More
Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon...

Read More
Three common GDPR misconceptions

By Jan van Vliet, VP and GM EMEA at Digital Guardian.

Read More
The devil is in the data

By Dileep Pisharody, Partner at Rosling King.

Read More
Industry poll gives significant insights into businesses’ ‘GDPR readiness’

By Scott Snively, data intelligence specialist, ASG Technologies.

Read More

Videos

Steve Haskew, Head of Sustainability and Social Leadership at Circular Computing, explains how the road to Net Zero almost certainly involves organisations considering their IT estate, especially in terms of...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Zeki Turedi, Field CTO Europe, Crowdstrike, discusses the findings of the 2024 Crowdstrike Global Threat Report, with the big increase in attack velocity perhaps the most significant trend. Zeki also covers...

News

Bitdefender has unveiled the newest evolution of its Managed Detection & Response Services now offered in two distinct tiers (MDR and MDR PLUS) tailored for a customer’s specific needs, environments, and...
New data shows a recent acceleration in AI uptake across the tech sector, while implementing AI to improve products and services slows across the IT and Communications space.
Acquisition will enable full-stack BMC Helix Observability and AIOps with application and network management capabilities.
CTERA launches honeypot decoy capabilities to address data extortion and insider threats.