Ex-employees have access to confidential data up to a week or more after leaving a company

One in three say it is ‘easy’ for ex-employees to access systems or information with old passwords.

Read More
Check Point teams with VMware

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention for all data centre traffic.

Read More
Organisations spend half a million pounds, annually, dealing with false positive alerts

A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence. The report found that teams spend, on average, 272 hours each week responding to ‘false positive’ cyber alerts –...

Read More
NTT Com Security and Fortinet form global security partnership

NTT Com Security and Fortine have entered into a formal partnership to provide expert security...

Read More
Bromium will enhance Windows 10’s Advanced Security with micro-virtualization

Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10,...

Read More
DDoS attacks damage customer confidence and revenues

More than half of IT security professionals (52 percent) said loss of customer trust and confidence...

Read More
Palo Alto Networks, Cisco and Dell are top vendors for intrusion detection and prevention

AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...

Read More
Fortinet closes acquisition of Meru Networks

Fortinet has closed the acquisition of Meru Networks. With the close of this acquisition, Fortinet...

Read More
Defence driven by understanding the attacker’s mindset

MWR InfoSecurity launches Countercept service – to catch a thief it has to think like one.

Read More
How to be a security policy management saint, not a sinner

The path to policy righteousness demands the right processes, visibility and automation – but...

Read More
Bitdefender signs MSP partnership deal with Blue Solutions

Security solutions provider has joined forces with established software distributor to protect...

Read More
Bolstering enterprise visibility into threats and vulnerabilities

Trustwave has carried out a major enhancement to the company’s managed security services...

Read More
Etihad Airways chooses Okta to provide Identity Management Services in the cloud

Etihad Airways makes significant technology investment with Okta to drive innovation through...

Read More
Small businesses in the dark about cyber security

More than half of small businesses in the UK are unprepared for data breaches, CSID survey finds...

Read More

Videos

In this interview, Cathleen Nelson, VP Cloud Partnership at WSO2, discusses how enterprises are moving from treating AI as an add-on to embedding it at the heart of modern digital architecture. The...
As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
In this conversation, Daniel Welling, Co-Founder of MSP Finance Team, shares his perspective on the financial realities facing managed service providers today. He explores why profitability can be difficult to...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.
By Alexandra Thorer, Chief Growth Officer at BCS Consultancy.