Toshiba and Becrypt announce partnership

Toshiba to ‘bundle’ Becrypt Security with its mobile devices to target key markets including Healthcare and Local Government.

Read More
Neuer HP-Sicherheits-Service senkt das Geschäftsrisiko

Die ab sofort verfügbaren HP Security Metrics Services unterstützen Kunden dabei, schnelle, datengestützte Entscheidungen bei Sicherheitsrisiken im Unternehmen zu treffen. Dabei wird eine zum Patent angemeldete Methodik eingesetzt. Sie zeigt deutlich auf, wie sich ein...

Read More
LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) warnt seit langem vor massiver Cyber-Spionage

Read More
25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by...

Read More
Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced...

Read More
Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security...

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more...

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first...

Read More
Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
Innovation agency invests in cyber security

A cluster of companies in the UK’s Severn Valley have been identified in the latest search...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...

Expert Opinions

By David Higgins, Senior Director, Field Technology Office, CyberArk.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Stuart Farmer, Sales Director at Mercury Power.