NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
40 per cent of accounts are hacked by simply guessing user passwords

Kaspersky Lab launches new password manager to help secure passwords.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
Accelerating incident response

CyberArk has introduced advanced insider threat detection capabilities available through the...

Read More
Unifying fraud protection

RSA, a Dell Technologies business, has unveiled a centralized platform that is designed to...

Read More
Reimagining identity strategies

RSA, a Dell Technologies business, has showcased a series of enhancements to its RSA SecurID®...

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Thales addresses enterprise encryption key governance for Microsoft Azure

Key management-as-a-service (KMaaS) meets enterprise needs for direct control of encryption keys.

Read More
CyberArk supports Amazon Inspector

CyberArk has introduced expanded privileged account security solutions for Amazon Web Services...

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More

Videos

Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...

Expert Opinions

By Giedrius Steimantas, Engineering Manager, Oxylabs
By David Trossell, CEO and CTO of Bridgeworks
By Prasad Sankaran, President, Software and Platform Engineering at Cognizant.