Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to...

Read More
Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool...

Read More
Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration...

Read More
Okta appoints Andrew Wittman to Chief Marketing Officer

Okta has announced the appointment of Andrew Wittman to chief marketing officer (CMO). As CMO,...

Read More
Dell unveils ‘powerful new solutions’ at Vmworld

Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...

Read More
Focus is on software security design flaws

Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...

Read More
HyTrust partners with Intel

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...

Read More
‘Comprehensive’ protection for the hybrid data centre

McAfee, part of Intel Security, has announced key advancements to its Server Security Suites...

Read More
Is £266bn just the tip of the Cybercrime iceberg?

By Mark Sparshott, EMEA Director at Proofpoint.

Read More
Tripwire survey examines views of information security professionals at annual IT security conference

Tripwire, Inc. has announced the results of a survey of 215 attendees at the Black Hat USA 2014...

Read More
Data breaches prompt UK businesses to re-think data protection strategy

Trend Micro research finds majority of organisations lack customer notification processes required...

Read More
How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly...

Read More

Videos

Paul Alexander, Nokia's Head of Cloud Infrastructure Business, Europe at Nokia, discusses the network challenges faced by the data centre industry in the face of AI’s rapid expansion, as well as how...
Tony Abate, Vice President and Chief Technology Officer at AtmosAir Solutions, explains how to make data centres more efficient and sustainable by implementing bi-polar ionisation (BPI) technology. The...
Steven Wood, Director, Solution Consulting (EMEA), OpenText Cybersecurity, discusses the results of the company’s recent Cybersecurity Global Managed Security survey, with AI, automation and integration very...
Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...

Expert Opinions

With Richard Jones, VP EMEA, Confluent.
By Ramzi Charif, VP Technical Operations, EMEA, VIRTUS Data Centres.
By Darren Thomson, Field CTO EMEAI at Commvault.
By Laura Friend, UK Enterprise Lead, Amplitude.