NEWS
How mass remote work has changed DDoS

It’s hard to imagine a time when Internet connectivity was such an important commodity in our everyday lives. In the pre-pandemic world we relied on it, but the act of national lockdowns, global travel restrictions and quarantine orders pushed us to lean ever more heavily on that connectivity. By Ashley Stephenson, CTO, for Corero Network Security.

Read More
NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
A question of priorities

Where should cloud-centric organisations focus data protection? By Anurag Kahol, CTO, Bitglass.

Read More
NEWS
Misconceptions around cloud-native security

The most crucial part of any cloud native journey is learning about cloud native security early on in the process. By Rani Osnat, VP Strategy at Aqua Security.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the everywhere workplace, which is the future of work. By Nayaki Nayyar, Executive Vice President and Chief Product Officer, Ivanti.

Read More
NEWS
Why openness means better cyber security

The Open XDR movement is gaining traction. By Brian Foster, Vice President of Product Management at ReliaQuest.

Read More
NEWS
How to develop and maintain an effective DevSecOps culture

Every increment in understanding and collaboration around the stack, delivery, governance and empowerment is a positive step forward in realising DevSecOps and safer applications. By Patrick Debois, Director of Market Strategy, Snyk.

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for governments to adopt a risk-based approach to cybersecurity. By Adam Vincent, Co-Founder and CEO at ThreatConnect.

Read More
NEWS
How QKD is combatting the increased sophistication of today’s cyber-attacks?

As global economises digitalise at speed, our collective success depends on the trust of secure and reliable encryption systems, a dependence as vast as it is easy to under-estimate. By Dr. Andrew Shields, Head of Quantum Technology at Toshiba Europe.

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust. By Nic Sarginson, Principal Solutions Engineer, Yubico.

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager, Menlo Security.

Read More

Videos

Nathan Blom, newly appointed Chief Commercial Officer at Iceotope, discusses the company’s plans to bring its precision immersion cooling technology to more and more data centre owners and operators across the globe, working with some key partners, as higher densities and sustainability demand innovative thinking when it comes to digital infrastructure.
In this video we talk toArcadis at Data Centre Transformation 2023 and find out what keeps their Project Director James Rix up at night.
In this video we talk to Portman Partners about their experience at the 2023 Data Centre Transformation Event!
Simon Marr, Managing Director of Marr Contracting, discusses the drawbacks of traditional data centre construction methods, explaining how an innovative approach to cranage usage brings with it significant project benefits, including significantly reduced build times, lower project costs, improved quality and safety, not to mention greener construction. www.marr.com.au

News

With application ownership and governance issues often put to the side in a rush to introduce new infrastructure, 53% of CIOs (Chief Information Officers) and ITDs (IT Directors) are unable to confirm exactly how many applications were running on their estate.
Hornetsecurity’s 365 Permission Manager delivers effortless permissions management for Microsoft 365.
ThreatQ Platform and ThreatQ Investigations allow Thales to pioneer market-leading personalised threat intelligence services.
High-speed I/O, genderless backplane cables, mezzanine board-to-board connectors and near-ASIC connector-to-cable solutions speed path to 224 Gbps-PAM4.