NEWS
Covid-19 and the holy grail of IT asset management

In the wake of COVID-19 lockdown orders, enterprise IT governance has become more critical -- and complicated -- than ever before. By Roel Decneut, CMO at Lansweeper.

Read More
NEWS
Bad security hinders productivity, Good security enables it

For a long time many have thought of identity security as a necessary burden. All those passwords, all those access denials, all that budget drained away from the profit centres of the enterprise - that's how many business leaders view this aspect of IT instead of recognising its benefits. The truth is quite different. By Saira Guthrie, Senior Product Marketing Manager, Ping Identity.

Read More
NEWS
Cybersecurity – the journey from confusion to collaboration

In an interview sponsored by Kaspersky, security practitioner Naveen Vasudeva, MD and Co-Founder of CISO International, addresses the current disjoint which exists between cybersecurity vendors and their customers. Naveen believes that, as end users wrestle with the complexities of security in the digital age, they need trusted partners who will work with them to help identify and implement optimised solutions.

Read More
NEWS
False dawn: Could the risk of a ransomware attack increase going back to the office?

Slowly but surely, more UK employees are being encouraged back into the office, with the Government keen to accelerate this even further. For many businesses, this will be welcome news, especially those who have struggled to adapt to working from home. By Ian Wood, Senior Director, Head of Technology UK&I, Veritas.

Read More
NEWS
Breadth vs Depth: Attacker behaviour detection

One of the biggest challenges in keeping any organisation secure is the sheer volume and range of potential cyber attacks that defences must account for. The complexity of the modern IT environment means there is an endless number of new attack paths waiting to be unearthed by threat actors. By Matt Walmsley, EMEA Director at Vectra.

Read More
NEWS
Zero trust – a rose by any other name…

At a recent forum of senior CTOs, CISOs and analysts, several participants expressed a dislike for the term ‘zero trust’. Comments such as the vagueness of the message, the way different vendors use it and the confusion it caused amongst users made some forum members steer away from its branding for both internal and external communication. The group all agreed that the concepts behind zero trust are sound, but many wanted a better way to describe it to their broader organisations. By Phil Allen, VP, Ping Identity.

Read More
NEWS
SaaS data ownership

Turning privacy and governance into competitive advantage. By Joe Gaska, Founder and CEO of GRAX.

Read More
NEWS
Will the death of Privacy Shield be the awakening of European tech?

Ever since Snowden revealed the extent to which US intelligence agencies can so easily access our data, people have become mistrustful of US companies. A survey by GMX last year, for example, revealed that 73% of British internet users mistrust US companies over data protection concerns, which is more than double that of a similar survey in 2015 which showed that only 35% had such concerns. 8% of UK internet users have even left a US online service due to privacy concerns within the last twelve months, while 11% are planning to do so. By Jan Oetjen, CEO GMX.

Read More
NEWS
Why organisations need SaaS Protection when moving to cloud services

As the Coronavirus pandemic continues to unfold, organisations across all industries have been forced to adapt and adjust their digital transformation projects to meet the needs of a fast-changing world. Covid-19 has not slowed digitalisation down; on the contrary, it has been a key factor in accelerating such initiatives. Partly driven by the need for flexible and remote working, more and more businesses are migrating their data and business operations to the cloud. By Radhesh Menon, Chief Product Officer, Datto.

Read More
NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business or customer trust greatly outweigh the benefits of securing data. After all, what good is data if you can’t access it. By Trevor Morgan, product manager at comforte AG.

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and £16.6 million lost in shopping fraud losses since the beginning of lockdown. Furthermore, with more than 15 billion credentials circulating on the dark web, cybercriminals have everything they need to commit account takeover attacks and other forms of fraud. By Mark Crichton, Senior Director of Security Product Management, OneSpan.

Read More
NEWS
Before adopting Artificial Intelligence, CISOs must answer the following questions

The use of artificial intelligence (AI) is hugely prevalent in almost all aspects of our day-to-day lives including security. Looking at the security landscape, supervised machine learning (ML) is well established in threat detection but unsupervised ML and deep learning are increasingly popular tools for post breach anomaly detection. By Jeremy D’Hoinne, Research Vice President, Gartner.

Read More
NEWS
Outside the four walls of the data centre

Almost four in 10 people in the EU began working remotely in the first few months of 2020, according to a study carried out by Eurofund. This is a seismic shift considering that the amount of people who regularly worked remotely before the pandemic took hold ranged from as low as 6% to as high as 23%, depending on country. By Michael Cade, Senior Global Technologist, Veeam.

Read More

Videos

Interview with Chelsea Slater, CEO at InnovateHer. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.
Interview with Samantha Humphries, Head of Security Strategy EMEA, Exabeam. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.
Interview with Liz Parnell, Chief Operating Officer, EMEA, at Rackspace Technology. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.
Interview with Dr Kiri Addison, Threat Detection and Efficacy Product Manager, Mimecast. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.

News

The new data centre will begin with 5MW of IT load and will be built in the company's leading-edge modular design.
Helping businesses address ‘unsustainable’ cost of data storage and management.
Focus on digital transformation, persistent skills shortages and new risks around cloud migration resulting in CISOs consolidating siloed, disparate and duplicate systems.
Leading geospatial intelligence company relies on AWS infrastructure, high performance computing, and analytics to give customers timely, actionable insights to expand their geospatial data applications.