Logo {!-- --}
NEWS
How mass remote work has changed DDoS

It’s hard to imagine a time when Internet connectivity was such an important commodity in our everyday lives. In the pre-pandemic world we relied on it, but the act of national lockdowns, global travel restrictions and quarantine orders pushed us to lean ever more heavily on that connectivity. By Ashley Stephenson, CTO, for Corero Network Security.

Read More
NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
A question of priorities

Where should cloud-centric organisations focus data protection? By Anurag Kahol, CTO, Bitglass.

Read More
NEWS
Misconceptions around cloud-native security

The most crucial part of any cloud native journey is learning about cloud native security early on in the process. By Rani Osnat, VP Strategy at Aqua Security.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the everywhere workplace, which is the future of work. By Nayaki Nayyar, Executive Vice President and Chief Product Officer, Ivanti.

Read More
NEWS
Why openness means better cyber security

The Open XDR movement is gaining traction. By Brian Foster, Vice President of Product Management at ReliaQuest.

Read More
NEWS
How to develop and maintain an effective DevSecOps culture

Every increment in understanding and collaboration around the stack, delivery, governance and empowerment is a positive step forward in realising DevSecOps and safer applications. By Patrick Debois, Director of Market Strategy, Snyk.

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for governments to adopt a risk-based approach to cybersecurity. By Adam Vincent, Co-Founder and CEO at ThreatConnect.

Read More
NEWS
How QKD is combatting the increased sophistication of today’s cyber-attacks?

As global economises digitalise at speed, our collective success depends on the trust of secure and reliable encryption systems, a dependence as vast as it is easy to under-estimate. By Dr. Andrew Shields, Head of Quantum Technology at Toshiba Europe.

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust. By Nic Sarginson, Principal Solutions Engineer, Yubico.

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager, Menlo Security.

Read More
NEWS
Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More
NEWS
Future of hybrid working and its impact on workspace governance

With hope on the horizon and a COVID-19 vaccination schedule in place, businesses are looking ahead and establishing plans to return employees to the office. By Seb Matthews, Chief Strategy Officer of ProvisionPoint

Read More

Videos

Dob Todorov, CEO and Co-founder of HeleCloud, talks though the company’s recent acquisition by SoftwareONE - optimistic that both organisations and their respective customer bases will see some major benefits as the Cloud continues to grow in importance as the post-pandemic business world seeks to address the challenges and opportunities of hybrid digital transformation.
Michael Queenan, Co-Founder and CEO of Nephos Technologies, explains the importance of understanding the whole data stack – the storage and the governance as well as the analytics – in order to turn the raw data into valuable, actionable information. Michael also details how his company is helping customers on their ‘data literacy’ journey, most recently with the introduction of a Data Governance as a Service solution.
Craig Stewart, Chief Technology Officer at SnapLogic, provides some fascinating insights as to how a combination of data and AI and Machine Learning is already providing major benefits across all industry sectors, not least in helping organisations to address major sustainability challenges; and also in allowing many businesses to capitalise on the IoT opportunity. In summary, Craig believes that few, if any, companies can afford to ignore the advantages of increased data literacy.
Astrid Wynne, Chair of the DCA’s Sustainability Special Interest Group, provides detailed and fascinating insight as to the sustainability challenges and opportunities facing the data centre industry in the aftermath of the recent COP26 Summit, as the sector continues to provide a resilient foundation for global digital transformation.

News

The data centre provider has expanded its services in Stevenage to meet growing demand.
Are the differences between net zero and carbon neutral well understood by those with an interest in the data centre sector? I doubt it. There are of course those more technically minded or interested individuals who do understand, but in the broad sweep of things the fundamentals are not and this can create considerable confusion. By Simon Harris, Head of Critical Infrastructure, BCS.
Nokia and OIV Digital Signals and Networks to deliver first 5G SA industrial private wireless campus network in Croatia for AD Plastik.
Sophos has unveiled Sophos ZTNA, the only zero trust network access (ZTNA) offering that fully integrates with an industry-leading, next-generation endpoint solution – Sophos Intercept X – providing advanced endpoint protection and zero trust network access with a single agent. Sophos ZTNA introduces a transparent and scalable security model for connecting users and devices to applications and data, improving and simplifying protection against ransomware and other advanced cybersecurity threats.