NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys, joining forces will help them fight to win. Having access to the latest information from peers and subject matter experts will typically help all organisations, large or small, deal with any threat...

Read More
NEWS
Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now expect to have, have a much larger appetite. By Mike Nelson, VP of IoT Security, DigiCert.

Read More
NEWS
Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a...

Read More
NEWS
Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors. It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum...

Read More
NEWS
De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with...

Read More
NEWS
Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....

Read More
NEWS
Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of...

Read More
NEWS
Why cybersecurity must be viewed as more than an IT issue

The right security approach is vital to a successful digital transformation. By Stan Lowe, global...

Read More
NEWS
Enhancing enterprise security and improving performance through software code analysis

Enterprises across the globe write and re-write billions upon billions of lines of software code in...

Read More
NEWS
How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making...

Read More
NEWS
Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs...

Read More
NEWS
GDPR Compliance – Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...

Read More

Videos

Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...
John Shultz, Chief Product Officer, AI and Learning Officer for Salute, discusses the company’s collaboration with Ecolab, enabling customers to protect their AI investments by reducing complexity and...
Tim Collier, director and UK data centre lead at Turner & Townsend, explains what’s needed to build confidence in the industry and to deliver data centres on schedule, how to navigate heightened competition...
In this conversation, Daniel Welling, Co-Founder of MSP Finance Team, shares his perspective on the financial realities facing managed service providers today. He explores why profitability can be difficult to...

News

New global research shows internal teams can’t keep pace, fueling demand for always-on, outcome-driven security services.
Abnormal AI strengthens its team with key executive hires amid rising AI-generated cybersecurity threats, aiming to enhance product innovation and customer support.
SolarWinds research reveals growing confidence in automation, however concerns around accuracy, skills and oversight remain.
As internet usage evolves, ISPs are exploring eSIM technology as a way to diversify services and respond to changing mobile connectivity demands.