NEWS
The future of passwords in the enterprise

Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use...

Read More
NEWS
Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...

Read More
NEWS
The implications of integrating facial authentication to protect customer data

Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten...

Read More
NEWS
The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter...

Read More
NEWS
The all new Chief Data Officer (CDO)

Digital transformation has changed the face of business, driving disruptive change and creating...

Read More
NEWS
GDPR Compliance – Reverting to Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...

Read More
NEWS
The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a...

Read More
NEWS
Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...

Read More
NEWS
Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...

Read More
NEWS
IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by...

Read More
NEWS
IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...

Read More
NEWS
Achieving the right balance between insight and data privacy

Mark Humphries, Managing Consultant for Civica Digital, explores the importance of data structure...

Read More

Videos

In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Paul Christensen, Macquarie Data Centres General Manager, discusses the company’s 47MW IC3 Super West Sydney AI data centre, in the context of its plans to build out some 200MW of AI and cloud capacity in...

News

Johnson Controls is conducting a European tour with a mobile showcase featuring its energy-efficient technologies and solutions.
Oracle has unveiled Fusion Agentic Applications, a suite designed for outcome-driven execution in enterprise environments.
Advantech and SecEdge collaborate to support security for AI models at the edge, including use in mission-critical and regulated applications.
LSEG has partnered with Dell Technologies to develop a private cloud platform and optimise its on-premises infrastructure, supporting resilience for its market data systems.