Encryption-as-a-Service offering

SafeNet, Inc. has announced ProtectV for Service Providers, an encryption solution that lets service providers deliver enhanced data protection and access control to their customers when storing their data in cloud and virtual environments. With analysts predicting that up to 70 percent of...

Read More
Report identifies new patterns in advanced target attacks

Analysis of firsthand experiences of the world’s most renowned cybersecurity forensics teams pinpoints exploitation of privileged accounts as a “signature” in targeted attacks.

Read More
Fortinet joins Equinix Cloud Exchange

Fortinet® has formed an alliance with Equinix, Inc., joining the Equinix Cloud Exchange™ to provide enterprises and service providers the most mature, scalable and reliable security solutions across multiple cloud architectures. Fortinet’s industry-leading, high capacity firewall...

Read More
Don’t let security leave with your staff

By Barry Scott, CTO, EMEA at Centrify.

Read More
Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for...

Read More
eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has...

Read More
Agari and Palo Alto agree to threat intelligence data exchange

Agari has entered into an agreement with Palo Alto Networks, the leader in enterprise security.

Read More
Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation...

Read More
No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of...

Read More
Top five tips for security behaviour management programs

By Scott Greaux, Vice President, Products and Services, PhishMe.

Read More
Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service...

Read More
Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber...

Read More
Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash...

Read More

Videos

In this video, DCS talks to Schneider Electric at DCW 2025
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Tony Kelly, Director of Alliances, EMEA at Fivetran, explains what Fivetran’s enhanced partner programme means – higher incentives via the four partner tiers, deeper go to market collaboration and expanded...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Yuval Moss, Vice President of solutions for Global Strategic Partners, CyberArk.
By Victoria Boryaeva - Senior Director of Marketing and Business Development at Pulseway
By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.