Hackers still one step away from your information

Research from SecureAuth reveals two in five (39%) IT decision makers in the UK admit that passwords are their only IT security measure.

Read More
Customised cybersecurity solutions help overcome industry-specific challenges

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organisations to adopt cybersecurity solutions in order to secure computing resources, information, networks and applications. As such, innovations will be...

Read More
Huawei launches ICT solutions at CeBIT

Huawei has shared its vision of “Innovative ICT, Building a Better Connected World” and introduced its latest innovative ICT solutions at CeBIT 2015 in Hannover, Germany. Huawei believes that innovative ICT is the cornerstone for building a better connected world and strives to be the...

Read More
Nuix Launches Sensitive Data Finder

Nuix has launched Nuix Sensitive Data Finder, a breakthrough technology that quickly and precisely identifies high-risk and high-value information wherever it is stored. This helps organisations comply with privacy laws and regulatory requirements, and defend vital information against cybersecurity...

Read More
A10 kit arrives at coreTX PoPs

C4L has commenced deployment of a network wide DDoS monitoring and mitigation solution for its high...

Read More
Security-as-a-service savings

Alert Logic has revealed the findings of a commissioned Total Economic Impact (TEI) study conducted...

Read More
Ensuring end-to-end network security

Aerohive Networks has developed a new iOS App for guest and Bring Your Own Device (BYOD) management...

Read More
Barracuda security and storage available on vCloud Air

Barracuda Networks says that Barracuda NG Firewall, Barracuda Message Archiver, Barracuda Spam...

Read More
NEWS
Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are...

Read More
NEWS
AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom,...

Read More
NEWS
Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an...

Read More
NEWS
Hardware failures to blame as business disruptions rise

Sungard Availability Services (Sungard AS) has revealed that UK invocations have hit their highest...

Read More
Managing identity in the Cloud

10Duke has launched the 10Duke Identity Provider, a cloud-based Identity-as-a Service product....

Read More
NEWS
Fixing weak passwords

By Chris Stoneff, director of professional services at Lieberman Software Corporation.

Read More
NEWS
Crosskey selects AlienVault USM for in-house security management

Finnish card payment system provider gains complete security visibility and combats banking malware.

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
DCW Asia 2025 - Part 1 of 3

Expert Opinions

By Dmitry Panenkov, CEO and founder of emma, the cloud management platform.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Haris Pylarinos, Founder and CEO of Hack The Box