NEWS
Citrix expands secure access solutions

New, cloud-delivered, Zero Trust Network Access service protects all apps, data and devices, enabling employees to work where and how they want in a secure, productive manner.

Read More
NEWS
Egnyte 'empowers' the ransomware fight back

New platform capabilities protect content against thousands of ransomware variants and enable rapid recovery when files are infected.

Read More
NEWS
ExtraHop introduces Proactive Threat Hunting and Network Assurance Services

Expanded Reveal(x) Advisor services help organizations proactively manage cybersecurity hygiene and accelerate incident response.

Read More
NEWS
One Identity acquires OneLogin

Solutions address increasing flood of security incidents caused by mismanaged identities, helping organizations enhance their overall cybersecurity posture.

Read More
NEWS
Zero Trust Trend

Trend Micro Zero Trust Risk Insights reveals and prioritizes risks for better decision making.

Read More
NEWS
Alkira and Check Point Software Technologies collaborate

Cloud networking pioneer Alkira® and cloud security specialist Check Point Software Technologies...

Read More
NEWS
Clavister introduces subscription-based pricing model

Clavister shifts to fully subscription-based model, making the unique Clavister cybersecurity...

Read More
NEWS
Report highlights trends and challenges of automating IT security systems

ThreatQuotient has released the State of Cyber Security Automation Adoption in 2021, new research...

Read More
NEWS
Tanium launches Risk Analysis capability

Organizations of all sizes can take a proactive, data-driven and continuous approach to assessing...

Read More
NEWS
Akamai to acquire Guardicore

Akamai Technologies has entered into a definitive agreement to acquire Tel Aviv, Israel-based...

Read More
NEWS
The larger the SMB, the larger the remote working security headache

Avast research finds over half of SMB IT Decision Makers are more concerned about cyber security...

Read More
NEWS
Securing customer data is top priority

41% of IT leaders say content sprawl is increasing the risk of data breaches and leaks.

Read More
NEWS
Notable growth in open source, cloud and container security efforts

The 12th iteration of the Building Security In Maturity Model reflects high-profile ransomware and...

Read More
NEWS
Manufacturing makes light of ransomware?

Sophos has published a new sectoral survey report, “The State of Ransomware in Manufacturing and...

Read More
NEWS
Manual processes hinder digital certificate volumes

Enterprises lacking automation and discovery are challenged by rogue certificates, unmanaged...

Read More

Videos

Chris Derham, Business Development Director – Networks, Alcatel-Lucent Enterprise, discusses the company’s innovative generative AI chatbot, ALIE, which is available on a global scale for use by channel...
DCS talks to Legrand at the DCA's 2025 10x10 Event
Todd Grabowski, President of Data Centre Solutions at Johnson Controls, explains how the company has expanded the availability of its leading YORK range of YVAM air-cooled magnetic bearing chillers to Europe...
In this video, DCS talks to Panduit at the DCA's 2025 10x10 Event

Expert Opinions

By Manuel Sanchez, Information Security and Compliance Specialist, iManage.
The NIS2 Directive is transforming the cyber security landscape for critical infrastructure sectors. While compliance is essential, navigating its complexities can be challenging. ABB’s Jason Newby, Advisory...
By Jessica Bere, technical director at Gateley Hamer.
Steve Clifford, director of data centres, EMCOR UK, explores the challenges of data centre demand and explains why with the right planning, engineering expertise, and risk management, retrofitting existing...