NEWS
Preventing fraud during the peak of consumer digital adoption

By Brett Beranek, Vice-President & General Manager, Security & Biometrics Line of Business at Nuance Communications.

Read More
NEWS
Meet The Three Amigos of Data: Governance, Privacy and Security

By Michael Queenan, co-founder and CEO of Nephos Technologies.

Read More
NEWS
Demystifying the security industry’s latest term: XDR

By Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity.

Read More
NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source...

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten...

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More

Videos

In this video, DCS talks to Essentra at DCW 2025
In this video, DCS talks to VID Firekill at DCW 2025
In this video, DCS talks to Forbo at DCW 2025
In this video, DCS talks to R&M at DCW 2025

News

20i has chosen Kao Data's state-of-the-art Harlow facility as its new data centre supplier, enhancing service performance, speed, security and reliability for both its customers and infrastructure.
Research revealed at Coterie Connect event highlights shifting team structures, evolving skills priorities, and urgent training needed for partner marketing success by 2030.
Expanded platform offers new approach to detecting and prioritizing risk, starting with comprehensive visibility across the total attack surface.
AI portfolio adds enhancements to Red Hat OpenShift AI and Red Hat Enterprise Linux AI to help operationalise AI strategies.