NEWS
Discoverin who and what is on the network

Juniper Networks has released its Adaptive Threat Profiling feature for Juniper® Advanced Threat Prevention (ATP) Cloud, WootCloud HyperContext® integration for device profiling and Juniper Secure Connect VPN application, giving organizations deep network visibility and extending security policy...

Read More
NEWS
Global pandemic was an inflection point that put cybersecurity teams’ grades to the test

DomainTools has released its annual Cybersecurity Report Card in which security analysts, threat hunters, and other cyber professionals on the front lines self-grade the security posture of their organizations. Now in its fourth year, the survey responses build on the results of the previous 2019,...

Read More
NEWS
Ping Identity launches Cloud Services

PingOne Services provide multi-factor authentication and real-time threat detection for stronger overall customer and workforce security.

Read More
NEWS
Forcepoint and Fujitsu shine a light on Shadow IT

Addressing cloud security challenges through Fujitsu Managed Security Services.

Read More
NEWS
Passing on passwords

Password-related challenges continue in remote work environment; Passwordless Authentication proves...

Read More
NEWS
Remote working leads to increases in cyber attacks

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working...

Read More
NEWS
Dynamic user protection

Forcepoint Dynamic User Protection brings mainstream UAM and insider threat protection with...

Read More
NEWS
Half of organisations experience remote working security incidents

With the majority of companies believing the future of work will be remote or “hybrid”, Tessian...

Read More
NEWS
Europe adopts Zero Trust approach

New survey indicates more than two-thirds of European organisations are planning to adopt Zero...

Read More
NEWS
CyberSmart to lead research on cybersecurity in the blended workplace

As lockdown measures tighten once more in response to COVID cases, many organisations are being...

Read More
NEWS
QR codes pose significant security risks

MobileIron has published the results of a new consumer sentiment study, which revealed QR codes are...

Read More
NEWS
Research finds spike in evasive threats

New report underscores the importance of layered security as zero day malware variants, JavaScript...

Read More
NEWS
Ransomware operators are banding together

Positive Technologies has released its most recent Cyber Threatscape report, an analysis of Q2 2020...

Read More
NEWS
Collaboration the way forward for government cybersecurity?

Report on government cyber security shows phishing, remote working and election security are common...

Read More

Videos

Johan van Hover, Business Manager at Arteco Coolants, outlines the company’s history as a joint venture between Chevron and TotalEnergies and its reputation for high performance coolant technologies,...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.
Dr Poh Seng (PS) Lee, Professor and Head of Mechanical Engineering at the National University of Singapore (NUS) and Executive Director of the Energy Studies Institute (ESI), previews his involvement with the...

Expert Opinions

Nick Rogers, CEO of Exacta Technologies, explores the growing importance for businesses to prioritise on-premises over cloud storage in not only reducing hefty management costs but to ensure complete control...
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...
By Simon West, General Manager, Network Group.