NEWS
Why have we become desensitised to cyber-attacks?

1989 was of a year of positive milestones which would have a profound impact on the way we live and work today. The World Wide Web was invented, the Berlin Wall was torn down, and the first GPS satellite went into orbit. However, not everything about the year was a cause for celebration. Alongside...

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and their techniques are more sophisticated than ever and are steamrolling over organisations’ security (or lack thereof) defences. But what’s more intriguing is that despite global increased spending on...

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation...

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a...

Read More
NEWS
Why a data breach doesn’t have to mean data loss

Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric...

Read More
NEWS
The tumultuous relationship between data and security

Our daily news updates have become littered with data breach after data breach, each costing...

Read More
NEWS
Taking the long view – why threat hunting should underpin strategic IT security

The US Navy SEALs have a well-known motto: “The only easy day was yesterday.” Taking a look at...

Read More
NEWS
How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years...

Read More
NEWS
Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the...

Read More
NEWS
Securing your company’s supply chain with objective information

Understanding the risk posed by third- and fourth-party companies can help mitigate security...

Read More
NEWS
Indecent exposure: could Wi-Fi be your weakest link?

Greig Schofield, Technical Manager at Netmetix, explores how Wi-Fi could expose your business –...

Read More

Videos

Andreas Keiger, Chief Revenue Officer at ZutaCore, discusses the AI power density challenge facing data centre owners and operators, looking at the various liquid cooling options available to address the...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

News

Standard Chartered teams up with Alibaba Group to leverage AI technologies, enhancing operations and customer experiences in financial services.
Zayo Europe bolsters pan-European network expansion and workforce growth, underlining its strategic focus in 2025.
Arctic Wolf teams up with Databricks to boost its Aurora Platform, enhancing security operations for faster and more efficient threat detection.
Ransomware attacks remain rampant worldwide with organisations facing multiple security challenges. A comprehensive study reveals crucial insights and strategies for bolstering cyber resilience.