NEWS
Organisations vulnerable to IoT-based attacks

New data from Extreme Networks reveals that IoT is barreling toward the enterprise, but organisations remain highly vulnerable to IoT-based attacks.

Read More
NEWS
Alarming complexity, resilience and frequency of cybercrime threats

More than 8.4 million DDoS attacks targeting IT infrastructures, cloud, mobile networks, and IoT devices reinforce increased risk for global enterprises and service providers.

Read More
NEWS
The Telco Security Alliance bolsters threat detection capabilities

The Telco Security Alliance has announced new collaborative efforts designed to further enhance the ability to detect and eliminate threats from customer environments.

Read More
NEWS
SentinelOne unveils Singularity

SentinelOne has unveiled its Singularity Platform. Singularity is an industry first data lake that seamlessly fuses together the data, access, control, and integration planes of its endpoint protection (EPP), endpoint detection and response (EDR), IoT security, and cloud workload protection (CWPP)...

Read More
NEWS
The cybersecurity talent shortage will get worse, say 62% of CISOs in global industry report

Talent shortage has created an active recruitment market, where 85% of senior cybersecurity...

Read More
NEWS
100,000 data breaches and counting

Although GDPR has produced a massive shift in personal data protection, European countries are...

Read More
NEWS
Less than a third of developers take full responsibility for security

Security responsibility is shared as developers and IT managers seek to manage control and...

Read More
NEWS
Trend Micro expands Partner Program for Asia Pacific, Middle East, and Africa

Trend Micro is launching a newly expanded and enhanced channel partner program in Asia Pacific,...

Read More
NEWS
Pulse Secure to power Interdata EasyConnect in France

Pulse Secure to power Interdata EasyConnect in France

Read More
NEWS
Security professionals are overconfident in the effectiveness of their security products

Security operations teams face challenges in understanding how their security tools work leading to...

Read More
NEWS
Powerful backdoor capabilities now available in commoditized ‘off the shelf’ malware

New research underlines potential value of backdoored machines using SSH machine identities, aided...

Read More
NEWS
Security scorecard receives recognition

Huntsman Security’s “Essential 8 Scorecard” wins “Best compliance product” and “Best...

Read More
NEWS
Pattonair puts cyber security front and centre with latest accreditation win

Global aerospace and defence supply chain specialist Pattonair has reinforced its data credentials...

Read More
NEWS
Security - a balance between humans and automation

Security professionals anticipate automation will reduce IT security headcount, but not replace...

Read More
NEWS
Risky funding!

OutThink secures £1.2m funding for world’s first Predictive Human Risk Intelligence SaaS...

Read More

Videos

Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Chris Coward, Director of Project Management and Anna Rantala, Marketing Manager – both at BCS - talk through the company’s recently launched Athlete Career Transition Programme, designed to address the...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...

Expert Opinions

By Duncan Roberts, Associate Director at Cognizant Research.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
Harnessing waste heat to reduce operating costs and improve sustainability.