What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of the biggest possibilities for the coming year.

Read More
Preparing for privacy

With indicators suggesting that organisations face much work ahead, AvePoint and CIPL partner to provide insight and guidance to ensure readiness for global impact of European data privacy mandate.

Read More
Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables customers to rapidly extract security metadata, including Indicators of Compromise (IOC), and fast-track that information to reporting tools to speed Mean Time to Identify (MTTI) and Mean Time to...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More
Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all...

Read More
NEWS
Employees consistently flout security policies, say IT managers

Despite investment in cyber security, employees are still putting organisations at risk,...

Read More
Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack...

Read More
NEWS
Tech giants collaborate on zero outage

Founding Members Brocade, Cisco, Dell EMC, Hitachi Data Systems (HDS), Hewlett Packard Enterprise...

Read More
Swamped by security

Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...

Read More
Atos offers global prescriptive threat detection and instantaneous remediation

Atos has revealed a new managed security service provider (MSSP) partnership with Intel Security....

Read More
Datto launches ransomware protection

Datto unveils automatic ransomware detection and recovery for small, midsized businesses.

Read More
Pulse Secure adds device discovery and profiling

Highly automated advanced detection and classification of managed and unmanaged devices secures...

Read More
NEWS
SonicWall spins out from Dell Software Group

Francisco Partners and Elliott Management complete acquisition of Dell Software Group; spin out...

Read More
Flex Tap to fortify business critical application security

Ixia has introduced the latest addition to the company’s reliable network taps family of...

Read More
Recovering ransomware-encrypted files without a backup

ExtraHop has introduced a new version of its award-winning ransomware mitigation offering that,...

Read More

Videos

In this video, DCS talks to Accelsius at the DCA's 2025 10x10 Event
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
In this video, DCS talks to Mark Acton, DCA at their 2025 10x10 Event
Egli Kaja, Project Manager, BCS, describes his journey from professional footballer to data centre project management, as part of BCS’s Athlete Career Transition Programme, designed to address the data...

Expert Opinions

By Zeki Turedi, Field CTO, EMEA, CrowdStrike.
By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.
By Kevin Jones, Consultancy Director, Schneider Electric UK&I.