DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Bit9 and Carbon Black merge

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...

Read More
Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...

Read More
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...

Read More
Security concerns holding back data centre consolidation and Cloud migration

Security concerns are preventing businesses from unlocking the potential benefits of data centre...

Read More
Driven by end-user digital demand, Capgemini consolidates digital expertise in new global service line

Consolidation of three year industry research program with MIT Center for Digital Business and...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Andy Cocking, Sales Director, MSP, EMEA & APAC, Barracuda
By Giedrius Steimantas, Engineering Manager, Oxylabs