NEWS
Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has transformed the data landscape and its effects look set to extend into the future, as nations worldwide adopt similar laws. Furthermore, big tech companies are leading the way with assurances of greater...

Read More
NEWS
How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are already within the network perimeter, often with privileged access to the company’s critical data, systems, and applications. They are a trusted part of the...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge opportunity for businesses to harness data, optimise their operations and deliver more personalised experiences to users. By Martin Ewings, Director of Specialist Markets, Experis.

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with...

Read More
NEWS
Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Why cybersecurity must be viewed as more than an IT issue

The right security approach is vital to a successful digital transformation. By Stan Lowe, global...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

News

Riello UPS has introduced the M2X, a modular protection solution for smaller data centres, aimed at supporting reliability and operational efficiency.
TELUS and RingCentral integrate AI features into Business Connect to support business communications and customer interactions.
Derek Whigham has been appointed Non-Executive Director and Strategic Advisor at Acumen Cyber, marking an enhancement in their leadership team.
Nozomi Networks begins a new phase of growth following the acquisition, continuing its independent and vendor-neutral operations.