Defending against `Cryptopocalypse’

The combined effects of alleged NSA tampering to weaken public key encryption and the rising power of encryption cracking tools means existing encryption tools are suspect, and new tools such as Security Innovation’s NTRU are needed

Read More
Getting the message right

Market research reports, such as this one about the health and care market, often suggest that problems in the marketplace lie with the customers, CSW Editor, Martin Banks, suggests it could be vendors using the wrong messages

Read More
The last rites of traditional IT security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.

Read More
Simplicity, speed and security

Ethernet is everywhere and has become the go-to computer networking solution for the business...

Read More
A roaring success

Blue Tiger Solutions’ selection of City Lifeline as their colocation partner proved to be a...

Read More
WASP supplies polishing systems to Polish Data Centre

In acknowledgment of the latest trends, escalated by the increased risk of power failures, a Data...

Read More
NGD expands

New data hall will meet forecast demand for several hundred further racks.

Read More
Accountants lagging in cloud adoption

Another study, a different viewpoint, as Inuit’s research says accountants are lagging behind...

Read More
Supercomputer for Kajaani

CSC- IT Center for Science is deploying a highly energy-efficient supercomputer. The system is...

Read More

Videos

Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...

Expert Opinions

By Sam Kirkman, Director of Services for EMEA at NetSPI.
By Dave King, Product Engineering Architect at Cadence.
By Kyle Hauptfleisch, Chief Growth Officer, Daemon.