NEWS
How safe is 5G?

By Dan Schiappa, Executive Vice President and Chief Product Officer, Sophos.

Read More
NEWS
Cloud: Keeping transformations secure

Most mid-sized to large enterprises have already moved some of their infrastructure, data, and workloads into the cloud for better agility and efficiency. Nearly three-quarters of businesses are running a hybrid and/or multi-cloud strategy today, according to Forrester Research. By Kunal Anand, Chief Technology Officer at Imperva.

Read More
NEWS
Securing an ever-evolving platform: cybersecurity challenges

Cybersecurity is a worry for cloud users. Market research company Vanson Bourne, in conjunction with Nutanix, found that 60 per cent of companies cite security as the biggest factor impacting future cloud strategies. Increasing complexity and evolving technology promise to exacerbate security worries for cloud users, but a strategic approach to security and partnerships can keep data and applications safe. By Craig Tavares, Head of Cloud, Aptum.

Read More
NEWS
Experience zero hassle with Zero-Touch network security automation

Dania Ben Peretz, Product Manager at AlgoSec, discusses the steps needed for organizations to achieve Zero-Touch automation in their network security.

Read More
NEWS
Zero Trust – security in times of agility

The COVID-19 pandemic has forced businesses into operating under a “new norm” where the working from home (WFH) model has quickly become the recommended and preferred approach. Indeed, the COVID-19 pandemic is forcing organizations to transform how they conduct business, albeit in a very rapid way. By Shehzad Merchant, Chief Technology Officer at Gigamon.

Read More
NEWS
Fighting cryptosloth and getting to quantum safety

Quantum is coming as a powerful challenge to cryptography and all of the information modern encryption keeps safe. Many understand that but view it as a distant threat. What they don’t realise is how far they’ll have to go to prepare for it. By Tim Hollebeek, Industry and Standards Technical Strategist, DigiCert.

Read More
NEWS
Peeling the onion

The concept of a Zero Trust Networking is gaining in popularity. However, many organisations still think of security as protecting the perimeter – complete with layered security technologies resembling the layers of an onion. However, moving from a legacy position to a more progressive approach to cyber security need not be a big-bang project. Instead, some organisations are embarking on more manageable phased transitions that move over key functions with little disruption and with appropriate investment. By Scott Gordon (CISSP), CMO, Pulse Secure

Read More

Videos

Robert Belgrave, CEO of Pax8 EMEA, shares his plans for the company, following a recent $185 million investment round - with ongoing geographical and technology solutions expansion very much on the agenda. Robert also provides some fascinating insights into the post-pandemic Channel and end user business worlds.
Angus Shaw, Sales Director at Brigantia Partners Limited, outlines the company’s unique approach to Value Added Distribution as it focuses on both consolidating and expanding its highly successful cybersecurity solutions portfolio, and its key vendor and Channel partner relationships.
Tim Richards, the new Hoptroff CEO, talks through the opportunities to grow the business as it continues to provide timestamping and synchronised time technology solutions for its core financial market, alongside significant growth in a whole series of automation applications – driverless cars, 5G-enabled and smart cities to name but a few – where accurate time is crucial.
Or Lenchner, CEO, Bright Data, discusses the growing importance of ESG data, outlining the challenges of accessing, collecting, collating and analysing the many available data sources, and suggesting that improved government guidance and regulation is the way forward, along with the right analytics solution.

News

Carbon neutral remanufactured laptops will help decarbonise The Royal Mint’s IT estate, reducing Scope 3 emissions.
Activity related to the Russian invasion of Ukraine causes shifts in the threat landscape.
The AI-powered platform will make 5.7 terabytes of critical historical data easily discoverable and migrate the information to an Azure-hosted archive.
New runtime environment vulnerability analytics and support for the Go programming language position Dynatrace as the only solution that provides real-time visibility and analysis across the entire application stack.