Why people are the key to cybersecurity

By Sean Paxton, Product Manager of Networks at Redcentric.

Read More
Keeping data sprawl in check

Organisations must be able to identify, locate and secure sensitive data in order to ensure compliance with the forthcoming EU Data Protection Regulation.By Nick Pollard, General Manager UK, Guidance Software.

Read More
Keeping up with a rapidly advancing cyber threat landscape

Why today’s cyber security strategy needs to focus more on data protection technologies and strategies by Luke Brown, Vice President & GM of Europe, Middle East, Africa, India & Latam at Digital Guardian.

Read More
Keeping up the balancing act: data protection and privacy invasion in the digital enterprise

Michael Hack, senior vice president at Ipswitch examines how organisations can engender customer trust through their data protection means.

Read More
Cloud-based access governance: Organisational continuity achieved

By Robert Doswell, Managing Director at Tools4ever UK.

Read More
Guess Who? – the game of authentication and fraud detection

By Amit Desai, Senior Director of Solutions Marketing, Verint-Systems.

Read More
Understanding the data protection ramifications of Safe Harbour

By Daniel Model, Manager of Sales Engineering Europe at Acronis.

Read More
People and paper: the well-intentioned threat of data protection and privacy?

By Gavin Siggers, Director of Professional Services, Iron Mountain.

Read More


Michael James and Terence Chabe, Capital Market Specialists at Colt Technology Services, discuss the implications for data centre infrastructure as some of Europe’s largest financial exchanges address the fallout from Brexit, with geography, latency, security, cloud services, software defined networks and the edge all in the spotlight.
Stéphane Estevez, EMEA Director of Product Marketing, Observability & IT Markets at Splunk, discusses the findings of the company’s ‘State of Observability 2022’ report. He outlines the three different stages of the observability journey, the main reasons why organisations adopt observability solutions and the main benefits of doing so. He ends up with some key observability recommendations.
Andre Azevedo, CEO at Ancoris, explains how the company’s new GreenLab Google Cloud service helps organisations to understand the actions they can take around their IT infrastructure to achieve their sustainability goals, with cloud migration a high priority for many.
Mickey Bresman, Co-Founder and CEO and Ran Harel, Senior Security Product Manager, both at Semperis, discuss the findings of the company’s recent Microsoft Active Directory security survey, and also explain how the Semperis Purple Knight security assessment tool not only highlights AD security gaps, but also provides recommended fixes.


Strategic agreement will enable global retailing house to create stronger omnichannel customer experiences and optimise internal supply chains through an enterprise data backbone and advanced AI/ML capabilities.
Ingenuity Studios has selected VAST to help deliver next-level realism to a host of long- and short-form works, including feature films, television series, music videos, commercials, and more. Ingenuity Studios tapped VAST Data’s Universal Storage architecture to leapfrog the status quo by deploying a simple data storage platform that allows artists and animators to easily collaborate on projects with ultra-fast performance and low-latency, without the classic flash storage tax.
Wrike has released new findings that uncover the cost of work complexities brought about by the Digital Era and accelerated transformations. According to the research report commissioned by Wrike, “Dark Matter of Work: The Hidden Cost of Work Complexities,” up to 55% of the work that takes place within an organisation is not visible to key stakeholders, costing organisations up to $60 million a year in wasted time, delayed or canceled projects, and employee churn. This lack of visibility has created the “Dark Matter of Work,” a term coined by Wrike Founder Andrew Filev to describe the vast amount of work that isn’t captured, tracked, or measured against goals because it takes place in synchronous applications and unstructured ways.
New research reveals majority of large businesses can’t replace unsupported hardware, leaving potential vulnerabilities exposed.