How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical...

Read More
Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More
IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More
Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in...

Read More
Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...

Read More
The Snowden Wasteland

By Calum MacLeod, VP of EMEA at Lieberman Software.

Read More
New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256...

Read More
IT budgets set to increase according to a third (37%) of financial services organisations

Survey of UK & Ireland financial services sector reveals companies are set to spend as...

Read More
Integration of Symantec’s Certificate Intelligence Center (CIC) with A10 Thunder ADCs

Provides customers with on-demand status of critical security data to help keep on top of their...

Read More
Skyscape secures Cyber Essentials Plus Scheme

Skyscape Cloud Services Limited has successfully achieved certification for the Government’s...

Read More
South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace...

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc...

Read More
Voltage SecureData z/Protect provides reliable, standards-based protection of sensitive data on IBM mainframes

Voltage Security has announced significant enhancements to Voltage SecureData z/Protect™ that...

Read More
Kroll joins “Bit9 + Carbon Black Connect” Alliance Program

Kroll uses Carbon Black to rapidly detect and respond to attacks and accelerate remediation efforts...

Read More

Videos

Rebecca Scottorn, Managing Director of LEK, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range of topics, including decarbonisation and...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Welcome to the WinStar Introductory Presentation!

Expert Opinions

By David Davies, Associate Director at Arup.
By Luca Rizzo, Segment Manager at ABB Motion High Power.
By Sadiq Syed, SVP Digital Buildings, Schneider Electric.
By Peter Miller, sales manager and refurbished technology expert, at ETB Technologies.