NEWS
79% of IT leaders see a worrying ‘Protection Gap’

Veeam Software has revealed that UK and Irish businesses are headed for a data protection emergency.

Read More
NEWS
Almost a third of malicious attacks target shadow APIs

Cequence Security has released its first half 2022 report titled, “API Protection Report: Shadow APIs and API Abuse Explode.” Chief among the findings was approximately 5 billion (31%) malicious transactions targeted unknown, unmanaged and unprotected APIs, commonly referred to as shadow APIs,...

Read More
NEWS
LogRhythm introduces cloud-native security operations platform

New LogRhythm Axon’s intuitive analyst experience and enhancements to LogRhythm SIEM, NDR and UEBA empower security teams to detect and disarm cyberthreats.

Read More
NEWS
Board members 'unprepared' for cyberattacks

Proofpoint and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, have released their Cybersecurity: The 2022 Board Perspective report, which explores board of directors’ perceptions about their key challenges and risks.

Read More
NEWS
Armadillo partners with Venari Security to raise the curtain on encrypted traffic

The partnership will enable Armadillo’s customers to maintain strong encryption standards, whilst...

Read More
NEWS
Stor.ai teams up with F5

New partnership will allow stor.ai to offer grocers Web Application Firewall (WAF) capabilities to...

Read More
NEWS
'Old-fashioned' authentication still the norm

Majority of employees still rely on username and password authentication.

Read More
NEWS
Illumio Endpoint extends Zero Trust Segmentation

Illumio, Inc., the Zero Trust Segmentation company, has introduced Illumio Endpoint®, a reimagined...

Read More
NEWS
81% of companies had a cloud security incident in the last year

According to new Venafi research, complexity due to increase, as companies plan to host more than...

Read More
NEWS
ThreatQuotient introduces new ThreatQ TDR Orchestrator features

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses...

Read More
NEWS
Paying the ransom is still the most common response to a ransomware attack

Although progress has been made, organisations are still paying out.

Read More
NEWS
Cybersecurity professionals fear severe disruption from CNI cyberattacks

New research from Forcepoint exposes how CNI cybersecurity professionals need greater support to...

Read More
NEWS
Neustar Security Services expands partner network in EMEA

New partners help joint customers enhance security and improve resilience.

Read More
NEWS
New data reveals nearly half of businesses are just beginning to address identity security

SailPoint Technologies Holdings has unveiled the findings of a new research report titled, ‘The...

Read More
NEWS
Ransomware attacks continue to increase

20% of all reported attacks occurred in the last 12 months.

Read More

Videos

Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
In this video, DCS talks to Schneider Electric at DCW 2025
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...

Expert Opinions

By Zeki Turedi, Field CTO, EMEA, CrowdStrike.
By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.
By Mike Fry, Infrastructure Data & Security Solutions Director at Logicalis UK&I.