State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even confirm whether or not their network has already been breached.

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More
Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More
How to beat the top vulnerabilities

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More
Very small businesses eager for mobile technology but lack security

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device...

Read More
ManageEngine enhances identity and access management portfolio

ManageEngine, the real-time IT management company, has announced enhancements across its identity...

Read More
Leading IT security technology 8MAN takes Europe ‘by storm’

Software distributor Prianto supports the plans for internationalisation made by Berlin-based...

Read More

Videos

Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

It’s easy to be astonished by how fast AI has progressed. But industry insiders are equally amazed by the pace at which the infrastructure underlying artificial intelligence has developed – and the surge...
In this opinion piece, Nigel Mallon, Business Development Manager for Data Centres at Weatherite, explores how heat recovery is transforming data centre efficiency. As energy demands rise, harnessing waste...