NEWS
Half of organisations fear security breaches and regulation noncompliance due to unstructured data

UK CIOs have revealed the huge extent of dark (unused) and unstructured data lurking within and posing a threat to medium and large organisations. Nine out of 10 respondents in research by Crown Records Management say that unstructured ‘data oceans’ – a wealth of data which is difficult to...

Read More
NEWS
Tech Data to offer Malwarebytes cybersecurity solutions

Agreement provides customers with access to leading ‘Endpoint Protection and Response’ cybersecurity solution.

Read More
NEWS
84% of UK CIOs and CISOs hold back from making critical updates to keep the business running

Latest Tanium research highlights the IT security and operational trade-offs that UK CIOs and CISOs face in protecting their business from disruption.

Read More
NEWS
Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More
NEWS
Privacy concerns grow

Nearly three out of four Brits are more alarmed than ever about their privacy, but many are willing...

Read More
NEWS
Report focuses on insider threats

Bitglass, the Next-Gen CASB company, has just released Threatbusters, its 2019 Insider Threat...

Read More
NEWS
Safeguard your business from evolving malware attacks

Barracuda researchers have uncovered an alarming new rise in the use of document-based malware. A...

Read More
NEWS
Aqua Security closes $62m in funding

Led by Insight Partners, the investment round will enable Aqua to expand its platform and market...

Read More
NEWS
Financial institutions fail to protect mobile apps

Research highlights a systemic failure to protect financial services apps against multiple...

Read More
NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate...

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’...

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now...

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More

Videos

Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...

Expert Opinions

By Joe Byrne, Global Field CTO at LaunchDarkly
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Troels Rasmussen, GM of Security, N-able.