Storm clouds in 2016?

Mike Weston, CEO of data science consultancy Profusion, discusses what issues will impact data protection and security in 2016.

Read More
NEWS
Top information security threats for 2016

As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face in the next 12 months.  While some of these trends started in 2015 and are expected to continue, others will bring new challenges for security professionals.

Read More
2015 has been another eventful year for cyber security

Based on its current work with customers, Blue Coat has outlined what the cyber security world can...

Read More
NEWS
Key trends taking place over 2016

Cybersecurity expert Gerard Bauer, VP EMEA at Vectra Networks, offers some thoughts on key...

Read More
NEWS
Cyber insurance – Why it matters for the Cloud

By Chris Pace, Head of Product Marketing at Wallix UK.

Read More
NEWS
Top IT security threats in 2016

Netwrix sums up top seven security trends that will drive IT strategy and investment in 2016.

Read More
Predicting the top five SMB threats of 2016

AppRiver’s manager of security research, Troy Gill, has analysed threat trends over the last...

Read More

Videos

Data Centre World Madrid 2025
Data Centre World Asia 2025
Alex Stoewer, CEO of Greenlight Data Centers, outlinees the data centre challenge as AI adoption is moving faster than infrastructure build out. Greenlight builds for the real world, one where extreme weather...

News

Home Bargains partners with Evolve Business Group to offer secure and resilient network solutions across 650 UK stores, ensuring seamless connectivity for continued expansion.
Westcon-Comstor partners with Cato Networks to expand the SASE market reach, offering a seamless and profitable solution for channel partners globally.
ControlMonkey introduces a Global Partner Program to streamline cloud automation with key partners, enhancing infrastructure management and resilience.
Derive transforms its platform, adding Governance and Operations modules to enhance cyber risk management and decision-making.