AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats facing their network, devices & users.

Read More
Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More
ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards,...

Read More
Retailers suffer 2x more SQL injection attacks than other industries

Imperva has released the results of the fourth annual Imperva Web Application Attack Report (WAAR),...

Read More
Employees are number one Cyber-security threat

Companies failing to respond to customer demand for proven cyber-security credentials.

Read More
Data security on the road

By Dave Anderson, senior director, Voltage Security.

Read More
Softcat welcomes 36 outstanding new recruits to support growth

Softcat, renowned in the channel for its investment in resource, welcomes 36 new recruits to its...

Read More

Videos

Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...

Expert Opinions

By Subhashis Nath, AVP and Head of Analytics, Infosys.
Nick Rogers, CEO of Exacta Technologies, explores the growing importance for businesses to prioritise on-premises over cloud storage in not only reducing hefty management costs but to ensure complete control...
By Darin Patterson, VP of Market Strategy at Make.
By Pascal Lemasson, AVP Business Development and Sales - Europe at MediaTek.