The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in 2014 with industry analyst firm Ovum. Focusing on just those responses from IT decision-makers at financial services organisations in France, Germany, and the United Kingdom (a total of 92 responses),...

Read More
Innovation agency invests in cyber security

A cluster of companies in the UK’s Severn Valley have been identified in the latest search for cyber security innovators that are developing new techniques to protect data from criminals. Seven companies located in this emerging cyber security hotspot have been selected as winners in the...

Read More
Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement,...

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
SecureDrives to debut 2.5inch self encrypting SSD

SecureDrives will take high-end data security to a revolutionary new level next week as it confirms...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Intralinks acquires document security leader docTrackr

Intralinks also gives customers sole control over data encryption keys, further strengthening...

Read More
Defining maturity model to securing privileged accounts

Best Practices Guide breaks down the process of locking down the most coveted asset in advanced and...

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More

Videos

Andy Venables, Chief Technology Officer & Co-Founder of POPX, discusses some of the challenges facing MSPs today, including providing a modern or digital service desk experience, managing service delivery in...
Dr Clare Walsh, Director of Education at the Institute of Analytics (IoA), and one of the of the world’s leading academic voices in data analytics and AI, discusses the ways in which AI will (and won’t)...
Louise Lahiff, COO of Version 1, shares her thoughts and insights on being a female leader in the tech industry, reflecting on the changes she has seen in her time working in a range of technical and HR roles,...
Jason Kemsley, Chief Revenue Officer and Co-Founder, Uptime, discusses the recent UptimeLIVE event, which delivered practical recommendations to help MSPs break through existing growth barriers, moving beyond...

Expert Opinions

By Steve Purser, former Head of Core Operations at the EU Agency for Cybersecurity, and Zivver’s Chief Information Security Officer, Nadine Hoogerwerf, get into the weeds on NIS2 and DORA.
By Ramzi Charif, VP Technical Operations, EMEA, VIRTUS Data Centres.
By Narek Tatevosyan, Product Director at Nebius AI.
By Cary Wright, VP of Product Management, Endace.