Eradicating rogue apps and domain infringement

Lagard?re gains visibility of over 10,000 public facing assets and protects its digital presence with RiskIQ.

Read More
Introducing Infoblox DNS Firewall as a Service

Cloud-based service expands the value of customer investment in Infoblox by providing visibility, policy management, and context-aware security for devices on-premise and off-premise.

Read More
NEWS
Awards celebrate industry success stories

The recent DCS Awards event, organised by Angel Business Communications, was a great opportunity to recognise the data centre technology and service innovations and achievements that are often taken for granted.

Read More
iSheriff and Soteria Intelligence partner

iSheriff  and Soteria Intelligence have formed a joint partnership to integrate Soteria Intelligence’s leading platform for social media threat assessment into iSheriff Complete, which provides cloud-based security for endpoints, websites and email. The combined offering is...

Read More
Tieto’s Security Services start-up strengthens its services

Tieto’s internal Security Services start-up, launched in January, now strengthens its service...

Read More
Index aids security benchmarking

Online resource behind benchmark survey promises to help companies measure the effectiveness of...

Read More
Danish order for Dencrypt

Dencrypt receives order from the Danish Ministry of Defence for encryption technology for...

Read More
IT calling for CEOs to be held accountable for data breaches

New research from VMware finds over a quarter (29 percent) of UK IT decision makers state the...

Read More
Only 17 per cent of businesses invest in cyber-security training for staff

The Open University says businesses need to understand the importance of building cyber-security...

Read More
70 percent of Windows environments at risk from malicious attacks

IT admins report heightened interest in visibility: configurations, settings and standards.

Read More
Financial services IT professionals 'overconfident' in breach detection capabilities

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
NEWS
Two thirds of large UK businesses hit by cyber breach or attack in past year

Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.

Read More
Checkmarx partners with WhiteSource

Checkmarx and WhiteSource have formed a partnership, providing Checkmarx users with a comprehensive...

Read More
Endpoint upgrade

New release steals time from attackers by automating the investigation of security alerts; new...

Read More
Alcatel-Lucent Enterprise OmniSwitches gain extra layer of security to battle modern cyber attacks

Alcatel-Lucent Enterprise OmniSwitches gain extra layer of security to battle modern cyber attacks.

Read More

Videos

In this interview, Jack Cooke, Senior Director of Global Partner Programs at Inforcer, discusses how MSPs are evolving in response to AI, security and the growing complexity of the Microsoft ecosystem. He...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Keith Norman, Chief Marketing & Sustainability Officer of Lyten, explains the reasons behind the company’s acquisition of Northvolt’s battery assets in Sweden, with the site expected to resume operations...

Expert Opinions

In data centres, direct-to-chip liquid cooling relies on fast-acting valves to regulate coolant flow and protect servers from overheating. Yet across server racks operating 24/7, the cumulative energy demand...
By Daniele Viappiani, Economics and venture capital advisor with GC1 Ventures.
By Maximilian Greiner, VP Product Management at Paessler.
Why visibility into supporting operational systems matters just as much as protecting core IT.