Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments.

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT technology managed services, has formed the company's Cybersecurity Products Division, including a Research and Development (R&D) Center in Lowell, MA.

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
NEWS
Legacy data systems present a red flag for GDPR compliance

Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
MapR and Talend collaborate

Combined offering accelerates GDPR compliance by addressing key requirements around data inventory,...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Governance and catalogue updates for GDPR intelligence

Extends governance capability and introduces the data catalog.

Read More
Making a drama out of security

Forcepoint Cloud Security enhances process, people and technology readiness to combat ransomware...

Read More
Veritas introduces Classification Engine for intelligent data management

Data Insight 6.0 and Enterprise Vault 12.2 are first Veritas solutions to support...

Read More
Epose greatest compliance risk

A major GDPR awareness survey of senior IT executives - across 200 medium to large UK...

Read More
NEWS
McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
NEWS
DDoS attacks on the increase

Financially motivated DDoS attacks driven by criminal extortion have garnered security...

Read More

Videos

Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
Liz Blackman, Chief Marketing Officer at Avantra, discusses the continuing importance of DEI, despite some recent ‘push back’, explaining the importance of women's perspectives in creating balanced...
In this video, DCS talks to Panduit at the DCA's 2025 10x10 Event
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...

Expert Opinions

By Peter Miller, Sales Manager at ETB Technologies.
By Duncan Roberts, Associate Director at Cognizant Research.
By Yuval Moss, Vice President of solutions for Global Strategic Partners, CyberArk.