Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat...

Read More
Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More
Akamai Cloud Security Intelligence is the foundation for new services

Recognising the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its award-winning Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai...

Read More
AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000...

Read More
Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship...

Read More
FireMon acquires mmediate Insight to expand security solutions portfolio

Acquisition delivers first-ever combination of proactive network security intelligence and...

Read More
CipherCloud unveils Global Compliance Resource Centre

Interactive online resource details data privacy laws in more than 80 countries.

Read More
Data security - top tips for senior managers

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved...

Read More
NHS Dumfries and Galloway adopts a proactive approach to safeguarding patient data

Guarding against security threats with a state-of-the-art vulnerability management solution.

Read More
Safeguarding storage from unauthorised access

Lock & Key is part of Imation’s recently announced Secure Data Movement Architecture...

Read More
Majority of IT pros don’t see senior management taking enough responsibility for insider threat

IS Decisions report finds that IT professionals want more involvement from senior management on...

Read More
Singtel to acquire Trustwave

New strategic investor to help take Trustwave to the next level by accelerating growth.

Read More
Protectig digital information everywhere

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...

Read More
BeyondTrust helps University of Winchester strengthen security without hampering productivity

Least privilege model reduces security risk and supports overhead for a top 20 university.

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
DCW Asia 2025 - Part 1 of 3

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer at Salute.
By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Haris Pylarinos, Founder and CEO of Hack The Box