Prioritising and streamlining security operations

Tenable delivers improved security visibility and critical context to help security teams remediate vulnerabilities and mitigate security threats.

Read More
Providing security automation at scale for Linux

Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems.

Read More
DNS attacks costing businesses more than $1 million

But almost 30 per cent of organisations still don’t rate DNS as an important part of their business.

Read More
ManageEngine adds SSL Certificate Management to its Privileged Identity Management Suite

ManageEngine has introduced SSL certificate management support in Key Manager Plus, its comprehensive, web-based solution for managing digital keys. Available immediately, the new version of Key Manager Plus provides visibility and centralised control over the entire life cycle of...

Read More
Security and speed are the main barriers to a connected workforce

A survey conducted by Nexsan has revealed that data security and download speeds were the...

Read More
NEWS
Over a third of organisations are yet to develop a cyber-attack response plan

Lack of preparation by businesses alarming due to multi-faceted threat landscape.

Read More
Proofpoint delivers threat context into Splunk software

Multiple technology integrations enable Proofpoint email and social media context to be easily...

Read More
A clouded security picture?

Blue Coat Systems has revealed the initial results from an online study conducted by YouGov of...

Read More
Chemring launches 'world’s first AI cyber security system'

Chemring Technology Solutions has launched ForensicAI, an advanced system of artificial...

Read More
NEWS
Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were...

Read More
Trustwave and CounterTack team

Trustwave and CounterTack have formed an alliance to help businesses minimize the impact of...

Read More
WatchGuard acquires Hexis HawkEye G

Resulting technology integration will enable organisations to prevent, detect, correlate, and take...

Read More
ExtraHop debuts ransomware bundle

ExtraHop has introduced its new ransomware bundle for EMEA businesses to proactively prevent,...

Read More
Turn-key threat intelligence gateway

Filtering traffic from malicious IP addresses at line speed boosting efficiency and...

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
Operational sustainability in the data centre industry is increasingly dependent on infrastructure that can evolve without disruption, such as cooling pipework systems that can be easily maintained or rerouted...