Expanded network intelligence

Leading communications service provider (CSP) uses Allot network intelligence solutions to enhance policy control and charging capabilities and maintain high quality of experience (QoE).

Read More
Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of privileged accounts.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More
NEWS
Global CISOs concerned about cybersecurity readiness

Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...

Read More
NEWS
Dark web dangers

Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...

Read More
NEWS
Reducing the risk of data breaches

Centrify encourages businesses to increase their Identity and Access Management maturity to...

Read More
NEWS
Security plans under scrutiny

New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of...

Read More
VR and immersive technology the keys to cybersecurity recruitment?

New research shows millennials & post-millennials more likely to embrace a cybersecurity...

Read More
Managed security services mask skills shortage

Lack of internal skills and access to better technology driving UK businesses to partner with...

Read More
Companies invest in security solutions but not staff

Just 4% of IT departments have staff dedicated to analysing IT security logs and only 6% have...

Read More
NEWS
Security disrupts productivity

Help desks spend days dealing with user access complaints, while legitimate work gets blocked by...

Read More
Cybersecurity experts forecast future threats and proactive countermeasures

CompTIA releases new whitepaper on current and future threats based on input from cybersecurity...

Read More
NEWS
Generation Y “digital native” employees are most likely to practice sloppy cyber security

New research from T-Systems into cyber security behaviour and awareness has found that Generation...

Read More

Videos

Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...
In this interview, Cathleen Nelson, VP Cloud Partnership at WSO2, discusses how enterprises are moving from treating AI as an add-on to embedding it at the heart of modern digital architecture. The...
Falk Weinreich, CEO of Portus Data Centers, discusses the company’s focus on the DACH region, with plans to accelerate expansion of their existing data centre portfolio – most immediately with the...
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...

Expert Opinions

By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
By: Brian Kreidler, Team Leader Project Engineering, ZIEHL-ABEGG Inc.
At Atlassian Team '26 in Anaheim, industry leaders gathered to explore the next phase of AI, where context-aware systems and platform enhancements are set to redefine how work is automated and scaled across...
In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.