Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the latest version of the risk assessment software vsRisk™, which is fully compatible with ISO27001:2013. The new version also presents the opportunity to apply it to multiple information security...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and compliance expertise, is launching a range of unique products and services designed to help British organisations implement the newly released Cyber Essentials Scheme Requirements. These include a Cyber...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement, Imperva is addressing the massive security gaps left by increasingly complex IT infrastructures, and is delivering industry leading protection against insider threats.

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
ManageEngine fortifies enterprise security log analytics

New SIEM GA features: real-time event correlation, complete user audit trail, ISO 27001 reporting,...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Software warnt vor Ausfällen unternehmensinterner Anwendungen 

Neues Whitepaper von Paessler: Applikationen und Services mit Netzwerk-Monitoring überwachen

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
Understanding risk from a business perspective is a top security concern

Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...

Read More
Dell secures critical business data and devices

Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...

Expert Opinions

The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.