Our website makes use of cookies like most of the websites. In order to deliver a personalised, responsive and improved experience, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. These cookies are completely safe and secure and will never contain any sensitive information. By clicking continue here, you give your consent to the use of cookies by our website.


We take a look at how businesses can simplify the huge challenge of matching customer expectations to their current complex digital architecture, while still maintaining security with Jim Shaw, VP Customer Solutions & Value of Acquia.

Rick Orloff, Chief Security Officer at Code42 explains why implementing a multi-layered security strategy can minimise the damage caused by data breaches.

Businesses are fast-tracking their plans to move confidential data to the cloud, but many are failing to create adequate strategies for security and encryption.

New additions in Ping access-management solution add flexibility for those wanting to move their legacy applications to the web and a new sophisticated contextual sign-on   

SentinelOne introduces endpoint protection built for cloud and data centre based Linux servers

Friday, 19 February 2016 11:26

CensorNet acquires SMS PASSCODE

The new acquisition will grow CensorNet in Nordic and Dach areas and allow new mobile multi-factor security features to be added to the CensorNet product portfolio

Security is important but we all have budget limits, so here’s five ways to get the best price/quality offer for your businesses cybersecurity?

A new partnership enables code developers and DevOps to scan and manage open source and custom-developed software for potential vulnerabilities

New study reveals insufficient planning and lack of clear ownership and a lack of understanding by C-suite execs are major inhibitors to achieve cyber resilience for UK organisations

Thursday, 04 February 2016 17:01

The SIP Security Fallacy

From denial of service attacks to toll fraud, SIP trunking is inherently vulnerable Paul German, CEO, of VoipSec, insists it is time to think differently about SIP security – before it is too late.

GDPR compliance is going to be a hard nut to crack with the prospect of doing the work striking fear into the hearts of IT staff tasked to implement it

The EU Safe Harbour 1.0 ruling was declared invalid back in October 2015, what does that mean for organisations transferring data across boarders via the cloud?

Quarter four 2015 marked a real change in the way hackers used DDoS attacks to bring down sites and saw a massive rise in attack against UK sites

Thursday, 28 January 2016 09:08

Shifting business acceleration to the cloud

The emergence of the XaaS cloud model has laid the foundation for vertical cloud services, and allows businesses to mitigate burdens such as regulatory compliance and security says Nachiket Deshpande.

Wednesday, 27 January 2016 08:23

Three security threats to watch out for

Containerisation and the internet of things are all growing fast but they are also potential new avenues for cyber criminals to exploit says Mike Stute, Chief Scientist at Masergy

A new report shows a massive blame-game is being played out in corporate boardrooms as line of businesses claim IT is responsible for security, while IT claims it’s those who signed off the budget

Following a successful first year supporting Northern business transformation, IP EXPO Manchester 2016 is now open for registration

Egress Switch Secure Workspace enables organisations to collaborate in real-time while protecting sensitive customer data

The AWS marketplace expands its enterprise solutions with the addition of new AWS extension of Unisys Corporation’s data centre Stealth micro-segmentation security solution

Monday, 11 January 2016 14:41

2016 Cyber Security Predictions

Sophos Labs experts offer their top predictions for the threats and exploits your business is liable to see in 2016

Thursday, 07 January 2016 13:00

X-IO gets data at rest encryption

X-IO Technologies adds new levels of encryption to its storage solution portfolio

More than half of businesses are opting to move their most critical data to the cloud first as businesses realise the cloud offers better overall security than on premise

Wednesday, 16 December 2015 15:00

Shadow IT – innovation versus risk

Ed Macnair, CEO of CensorNet looks at what businesses need to consider when deciding their own risk profile

Businesses now have a date to work to for the implementation of the new General Data Protection Regulation, but they’ll have to wait until the New Year for the full details of what it entails

Tuesday, 15 December 2015 08:52

The data race is on for 2016

Tableau’s Bob Middleton spells out his top ten trends for 2016, from cloud price wars to the future for analytics

Tuesday, 15 December 2015 01:54

Dark DDoS attacks to rise in 2016

Distributed Denial of Service attacks used as a smokescreen to distract victims from other hidden activity, such as network infiltration and data theft are set to increase in 2016

In the second of our predictions on the future of cloud, Bill Platt, Chief Architect at BMC looks at some of the key issues for 2016

Nexus Firewall allows software developers to create applications that automatically use the latest secure builds of open source and third-party components

Thursday, 10 December 2015 09:51

The five most common web application mistakes

Web applications are becoming central to the way businesses work, but many developers are making the same basic mistakes and leaving their applications open to attack.

Thursday, 10 December 2015 09:25

How websites and web applications are attacked

A vulnerable web site and web application are gift to hackers, as it significantly reduces their time, cost and efforts to get into corporate network. In this two part article we shed light on the methods hackers use to gain access to your corporate data.

Page 1 of 9



255x635 banner2-compressed