By Dr Malcolm Murphy, systems engineering manager, Infoblox.
Will Embrey, Solutions Architect at global IT solutions provider HardwareSolutions discusses why companies should be making security a priority, and how to operate a more secure IT environment.
By Brandon Tansey, Security Research Engineer, Lancope.
By Poul Nielsen, Director of Strategy, Nexthink.
By Richard Cassidy, technical director EMEA, Alert Logic.
By Wieland Alge, VP and GM, EMEA at Barracuda Networks.
By Klaus Gheri, VP Network Security, Barracuda Networks.
By Scott Lang, Sr. Director, Product Marketing, BeyondTrust.
By Sergio Galindo, General Manager of GFI Software.
By Lawrence Munro, Director of EMEA & APAC at Trustwave.
By Patrick Hubbard, Head Geek at SolarWinds.
By Margee Abrams, Director of IT Security Services Product Marketing, Neustar.
By Monica Brink, Director of Product Marketing, iland.
By Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway.
By Mark Edge, UK country manager at Brainloop.
Old security policies and rules often stick around long after they’ve outstayed their welcome. Kyle Wickert, Lead Solution Architect of Product & Deployment of AlgoSec shows how you can ensure they check out and leave, for good.
By Dave Larson, CTO at Corero Network Security.
By Matt Allen,Solution Architect, Professional Services & EMEA Operations, Courion.
By Chris Pace, Head of Product Marketing at Wallix UK.
UK cyber security innovator Glasswall Solutions sees data security rising to the top of the corporate agenda as organisations fail to cope with new threats and regulations.
An effective leader will show the team how cybersecurity is done, says Nicholas Banks, vice president EMEA and APAC at IronKey by Imation.
By Simon Crosby, CTO and co-founder, Bromium.
By Cricket Liu, Chief DNS Architect, Infoblox.
By Professor Avishai Wool, CTO of AlgoSec.
By Ron Symons, regional director at A10 Networks.
"There are only two types of companies: those that have been hacked and those that will be. Even that is merging into one category: those that have been hacked and will be again." Cyber attacks are coming thick and fast and becoming almost an inevitability for UK business. It is as FBI Director Robert Mueller foresaw when speaking in March 2012. Ignorance is no longer bliss. It is essential that businesses proactively manage their cyber risks.
By Simon Gilbert, Managing Director, Elmore Insurance Brokers Limited.
OpenStack is now one of the most popular open-source cloud projects with the likes of eBay and Walmart relying on its framework. But recent incidents such as the VENOM breakout and Heartbleed SSL-related flaw have given rise to no small discussion around its security as a cloud platform. By Corey Nachrainer, CTO of WatchGuard.
By Monica Brink, EMEA Marketing Director, iland.
What do rats, cockroaches and DDoS attackers have in common? Not much, but one characteristic they do share is adaptive behavior. Just as rats are becoming increasingly immune to the poison meant to do away with them and cockroaches have evolved to survive without air for 45 minutes, DDoS attackers always find a way to adapt their methods and keep on attacking, even in the face of DDoS protection that has been specifically engineered to stop them.
By Duncan Hughes, systems engineering director, A10 Networks.
By Peter Godden, VP, EMEA at Zerto.
By Robert Arandjelovic, Blue Coat European Director of Security Strategy.
By Myles Bray, Vice President, EMEA Sales, ForeScout Technologies.
By Steve Watts, Co-Founder, SecurEnvoy.