Open standard for Cloud-based digital signatures

New industry consortium to pioneer open digital signatures for mobile and web

Read More
Gartner identifies security top ten

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More
Survey focuses on cyber weapons

LightCyber has published the results of its Cyber Weapons Report 2016, a first-of-its-kind industry study which uncovers the top tools attackers use once they penetrate a network and work towards successfully conducting a data breach or other malicious goals.

Read More
NEWS
Cyber threats impact on data losses

Incidents of traditional data loss and disruption are down since 2014, but new challenges mean...

Read More
Crypto-ransomware attacks rise five-fold

The number of users attacked with encryption ransomware is soaring, with 718,536 users hit...

Read More
Dedham Savings Bank protects against ransomware attacks

Varonis Systems has released details on how it is helping Dedham Savings Bank, a...

Read More
IT professionals lack knowledge on GDPR compliance

Research by iStorage indicates 20% of IT professionals not aware of GDPR fines; 25% unaware of...

Read More
Enhanced security for SMB mobile and remote workers

Dell SonicWALL Secure Mobile Access 100 Series OS 8.5 empowers IT with easy-to-use...

Read More
Businesses must act now to ensure GDPR compliance

New data protection regime places fresh emphasis on due diligence when procuring cloud services.

Read More
BeyondTrust expands portfolio of experts

Industry leaders join BeyondTrust to push the boundaries of the industry while accelerating...

Read More
Securing cloud access for mobile users

Integrated offering gives IT full visibility and control over mobile devices, apps, and activities.

Read More
Expanded support for cybersecurity frameworks

Tenable Cybersecurity Frameworks solution supports CIS Critical Security Controls, ISO/IEC...

Read More
NEWS
Malware threat continues to grow

Threat research for May 2016 shows a continuing rise in the number of active malware families...

Read More
EfficientIP launches SOLIDserver 6.0

EfficientIP has introduced SOLIDserver 6.0, a new interface for managing large IP networks,...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
DCW Asia 2025 - Part 3 of 3

Expert Opinions

By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Dmitry Panenkov, CEO and founder of emma, the cloud management platform.