NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For example, focus has shifted from a purely preventative strategy to one that seeks to reduce the time to detect and mitigate a security incident. However, one thing that hasn’t received a lot of attention is our concept of the endpoint. The endpoint is no longer just the hardware devices connecting to the network, but the applications that users leverage to work with your organisation. By Chad McDonald, VP of Customer Experience at Arxan Technologies.

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. By Yogi Chandiramani Technical Director for Zscaler EMEA.

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance the needs of security and user experience as they evolve their IT and processes.

Read More
NEWS
Are your vendors causing business disruption or affecting performance?

In today’s interconnected digital world, there are increasingly blurred lines between an organisation’s IT infrastructure and that of its closest partners so understanding your vendor landscape is critical. By Matthew McKenna, VP EMEA at SecurityScorecard.

Read More
NEWS
HR: The new central source of truth for business IT

Businesses the world over are facing ever increasing pressure to adapt and evolve their IT strategies to keep pace with technology to attract and maintain a productive, talented and happy workforce. However, it’s not just as simple as starting a fresh IT strategy, particularly as many businesses at an enterprise level have decades of legacy IT to contend with. By Dan Power, UK regional manager at OneLogin.

Read More
NEWS
What bots can learn from customer service agents

Technology is one of the few things in life we expect to just work. This is especially true when it comes to artificial intelligence (AI), which is a driving force behind today’s digital transformation. According to recent KPMG research, enterprises will spend an estimated £177 billion on intelligent automation technologies by 2025, with 49% of companies putting it to use in just three years. And that’s for good reason. By Ryan Lester, Director of Customer Engagement Technologies at LogMeIn.

Read More
NEWS
Botnets and machine learning: a story of “hide and seek”

Malware authors have always been trying to update their software and evolve their techniques in order to take advantage of new technologies and bypass security measures. By Leonidas Plagakis, Security Engineer, RiverSafe.

Read More
NEWS
Five top tips for small businesses adopting encryption

Becrypt has been in the disk encryption business for more than 15 years and have carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms. By Bernard Parsons, CEO, Becrypt.

Read More
NEWS
The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More
NEWS
When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free Wi-Fi in order to steal data and credentials from off-site employees, creating phony apps for smartphones, and even physically stealing a device as a whole. By Anurag Kahol, CTO at Bitglass.

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more than an afterthought, resulting in IoT products that at best, contain half-planned security measures and at worst, are a major liability to any network they connect to. By David Fearne, Global Practice Leader for Data Intelligence, Arrow ECS.

Read More

Videos

Dan Hoy, Director of Strategic Partnerships at Egress, explains why companies need to understand today’s heightened cyber security risk and implement intelligent email security solutions as part of a defence-in-depth strategy and goes on to outline how Egress, working through its channel partners, is experiencing significant growth thanks to its ‘best-of-breed’ solutions.
Continuing our series of interviews with leading industry experts, David Watkins, from VIRTUS Data Centres, discusses some of the many challenges and opportunities facing his own organisation and the wider data centre industry over the coming months and years, with sustainability the major focus.
Michael Cantor, CIO at Park Place Technologies, discusses how the role of the CIO continues to change and develop with the new challenges and opportunities presented by the world of technology. In addition to the CIO’s ‘traditional’ role of ensuring the smooth running of the IT department, as well as understanding how new technologies might impact on the business, the role now demands many new skills: sustainability, business intelligence and analytics to technology lifecycle, digital transformation, and customer experience.
Danny Quinn, MD of DataVita, explains how the company, working with Posetiv, examined the carbon intensity of Europe’s major data centre markets, highlighting how this carbon intensity could be massively reduced by moving data centres to greener energy locations.

News

Report unveils AI adoption rates for 2024 along with other tech and customer experience predictions.
New business metrics for Cisco Cloud Observability enable customers to significantly enhance critical business context when observing the end-to-end flow of modern applications.  
Telehouse research discovers that nearly one-in-three (29%) IT decision-makers identify a skills gap in AI adoption.
Hitachi Virtual Storage Platform infrastructure enables five-fold increase in application response times for better customer experience while lowering energy costs 60%.