Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to...

Read More
Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool...

Read More
Elitetele.com launches managed firewall services to help firms secure increasingly complex IT landscape

Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next generation firewalls, for IT teams struggling to secure a rapidly-evolving IT landscape.

Read More
Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with...

Read More
Failure of iCloud brings richer pickings for hackers

Computer security expert issues warning, in light of celebrity picture leaks.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration...

Read More
Okta appoints Andrew Wittman to Chief Marketing Officer

Okta has announced the appointment of Andrew Wittman to chief marketing officer (CMO). As CMO,...

Read More
How should your organisation approach big data?

By Christian Toon, Head of Information Risk for Europe at Iron Mountain.

Read More
How to ensure your site is secure

By Liam Enticknap, Network Solutions Architect, Peer 1 Hosting.

Read More
Dell unveils ‘powerful new solutions’ at Vmworld

Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...

Read More
Focus is on software security design flaws

Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...

Read More
HyTrust partners with Intel

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...

Read More
Milton Keynes College sows seeds for a Green future

Greener data centre solution reduces power usage and cooling costs by 75 percent.

Read More
Nutanix raises $140m Series E funding

Nutanix, the web-scale converged infrastructure company, has closed a $140 million Series E funding...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
DCW Asia 2025 - Part 2 of 3
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...

Expert Opinions

Andrew Winters, executive vice president- managed detection and response from Obrela discusses the telecoms industry’s distinctive cyber threat profile
By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.
By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.