DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Bit9 and Carbon Black merge

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...

Read More
Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...

Read More
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...

Read More
Security concerns holding back data centre consolidation and Cloud migration

Security concerns are preventing businesses from unlocking the potential benefits of data centre...

Read More
Driven by end-user digital demand, Capgemini consolidates digital expertise in new global service line

Consolidation of three year industry research program with MIT Center for Digital Business and...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More

Videos

Brandon Smith, VP of Global Sales and Product at ZincFive, how AI workloads are fundamentally changing data centre power profiles - shifting from steady, predictable loads to highly dynamic, burst-driven...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Simon Kerr, head of heat networks at EnergiRaven, discusses the recent analysis from EnergiRaven and Viegand Maagøe finds that projected growth in data centres will produce enough waste heat to warm millions...

Expert Opinions

Data centres are some of the country’s most important infrastructure. This is because they power the economy – from online streaming and mobile banking to the development and increasing use of AI. Which is...
By Darren Ellis; Managing Director, EMEA, Park Place Technologies.
By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Matt Middleton-Leal, Managing Director EMEA, Qualys