Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the challenges independent fostering and adoption agencies are facing when looking after sensitive personal information.

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal deutlich. Die Basis dafür bildet eine Kombination der Daten der Akamai Intelligent Platform mit denen eines umfangreichen Test-Frameworks

Read More
Silver Peak counters eavesdropping on corporate networks

Silver Peak has combined the best of site-to-site VPN security and WAN optimisation to deliver Accelerated IPSec. Silver Peak combines these capabilities to provide customers with the most cost-effective approach to securing and accelerating data in transit between data centres, remote offices and...

Read More
Prolexic warns of cyber attackers targeting stock prices

Prolexic Technologies has shared an analysis of nearly a dozen global DDoS attacks that indicates...

Read More
WeSecure helps Heemskerk save time and money

Varonis Systems, Inc. is working with the leading security integrator WeSecure to help Heemskerk...

Read More
Improvements to Akamai Kona Site Defender

Combination of data from Akamai Intelligent Platform and new testing framework improves security...

Read More
Avnet Technology Solutions UK collaborates with international law firm

Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.

Read More
Lancope delivers operational network security and visibility

New capabilities bring users closer to the right data at the right time for vastly improved network...

Read More
Firms risk permanent damage to their reputation with security savvy public

Businesses must make data protection their top priority in 2014 in the light of high profile data...

Read More
Bitdefender’s cybersecurity predictions for 2014

With 2014 now in full swing, Catalin Cosoi, Chief Security Strategist at Bitdefender, draws on his...

Read More
Novell increases investment in ZENworks portfolio

Company to acquire full breadth of product offering through the purchase of source code from SECUDE.

Read More
BYOx threatens to disrupt the IT landscape

SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role...

Read More
WatchGuard Technologies extends real-time network security visibility tool

WatchGuard Dimension now includes unlimited scalability and availability, intuitive reporting...

Read More
Trusteer partners with California State University

Trusteer has completed a five week research study on computer malware with 10 student interns at...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
In this video, DCS talks to Octaipipe at the DCA's 10x10 2025
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...

Expert Opinions

The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.