‘Have IT your way’: How network security should be like ordering a burger

Joe DiPietro at AlgoSec explores how businesses can improve the IT security/application delivery relationship – by following the example of fast food restaurants.

Read More
Blind trust is not a security strategy

By Lilac Schoenbeck, VP of Product Marketing and Development, iland.

Read More
Do you know where your archive call recording data Is?

Organisations that fail to take data seriously are not only risking the safety of their...

Read More
NEWS
Why you should prioritise cyber security irrespective of your company’s size

Small companies are just as vulnerable to cyber-attacks as larger organisations, says Isaac...

Read More
GDPR: What are we going to do with your data?

By Christine Andrews, managing director, DQM GRC.

Read More
What can we learn from some of the most devastating cyber attacks?

By Isaac George, SVP and UK Regional Head, Happiest Minds.

Read More
NEWS
Filling the gaps in network security strategies

By Jan Hof, International Marketing Director, ForeScout Technologies.

Read More

Videos

Mike Meyer, Managing Partner of Portman Partners, and Paul Cutliffe, Managing Director of Flint DC, explain why Portman Partners, the global data centre executive search business, is making a strategic...
Mark Yeeles, Schneider Electric’s Vice President, Secure Power Division, UK and Ireland, discusses the challenges and opportunities for the data centre industry as AI and data fuel a new industrial...
Mark Rushworth, Founder and CEO of Finchetto, outlines the company’s mission to significantly reduce data centre energy use and accelerate cluster performance with the world’s first fully-optical passive...
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...

News

Centreon provides end-to-end monitoring—from the network layer to the user experience—with advanced new features for Real User Monitoring (RUM) and Synthetic Transaction Monitoring (STM).
Only 54% of organisations have robust systems for moving data internally, while only 56% have accurate and consistent data.
Securonix has acquired ThreatQuotient, the force behind ThreatQ, an innovative external threat intelligence platform. This combination will create a comprehensive, modular, and fully integrated AI-driven...
CyberArk has introduced console and partner programme updates designed to help Managed Services Providers (MSPs) drive profitable identity security-based growth.