NEWS
Veeam and Sophos unite

Veeam and Sophos technologies integrate to vigilantly detect cybersecurity threats like ransomware, determine the warranted response, and quickly recover impacted data by exchanging critical information.

Read More
NEWS
CybExer Technologies launches channel partner programme

Soliton Systems and CybExer to enhance cybersecurity services in Japan.

Read More
NEWS
Semperis and Veritas to protect against Active Directory attacks

Semperis has formed a global relationship with Veritas Technologies to protect enterprises’ most critical assets and identity systems from cyberattacks. The powerful combination of Semperis Active Directory Forest Recovery (ADFR) and Veritas NetBackup provides enterprises with a comprehensive...

Read More
NEWS
CyberCX launches updated Ransomware and Cyber Extortion Best Practice Guide

CyberCX has launched its new Ransomware and Cyber Extortion Best Practice Guide, reflecting significant changes to the global cyber security landscape as businesses, organisations, and governments continue to grapple with established and emerging cyber threats.

Read More
NEWS
LogRhythm named as Official Cybersecurity Solution Provider to Romanian government agencies

Romanian governments gain access to LogRhythm SIEM to protect the country and its citizens from the...

Read More
NEWS
More than half of senior security professionals impacted by burnout

59% of UK senior cyber security professionals feel burnout at work has impacted their ability to do...

Read More
NEWS
Regulation responsibility is unclear claim CISOs

A third of CISOs agree that managing regulation is an ongoing challenge in their organisation, with...

Read More
NEWS
Keeper Security begins relationship with Ingram Micro

Distributor agreement addresses the growing impact of cybercrime on businesses across Europe.

Read More
NEWS
Quantifying the identity threat: a fifth of authentication requests are malicious

F5 Labs research finds 19.4% of authentication requests are likely driven by credential stuffing...

Read More
NEWS
OVHcloud sets to roll out Identity and Access Management

OVHcloud announces its latest security defining feature with advanced Identity and Access...

Read More
NEWS
Poor CEO grasp of threats and critical need for investment

Major increase in cyberattacks from deep fake AI technologies expected… but leaders lack both...

Read More
NEWS
SailPoint closes Osirium acquisition

Transaction feeds into company’s vision for unified identity security for the modern enterprise.

Read More
NEWS
48% of cyberattacks breach UK organisations’ defences

Security teams are so busy remediating cyberattacks that they don’t have time or resources to...

Read More
NEWS
BATM receives $3m cyber security order

BATM Advanced Communications has received a new cyber security order, with a value of $3m. The...

Read More
NEWS
Over half of UK IT leaders refused to work with a software vendor with poor security credentials

Almost all (92%) of IT decision makers cite email security as their main concern, with phishing...

Read More

Videos

Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...

Expert Opinions

By Stuart Farmer, Sales Director at Mercury Power.
By Michael Hunger, VP of Product Innovation, Neo4j.
By Krishna Narayanaswamy, Chief Technology Officer (CTO) at Netskope.
By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.