Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity management solution for Apache Hadoop-based big data infrastructures, as well as partnerships with industry-leading big data vendors Cloudera, Hortonworks and MapR Technologies. 

Read More
NEWS
Security fears stop firms using cloud computing services

New research from the Federation of Small Businesses (FSB) has found that despite three fifths (60%) of small firms questioned using cloud computing services, the remaining two fifths (38%) remain sceptical about the benefits of the technology in the face of perceived risks.

Read More
NEWS
Protecting gaming customers from DDoS attacks

Los Angeles Dedicated (LAD), a cloud and Infrastructure-as-a-Service provider with a strong focus on the gaming industry, has deployed the Corero SmartWall® Threat Defense System (TDS) with SecureWatch Analytics. With the Corero solutions in place, LAD has eliminated service disruptions caused...

Read More
Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat Protection solution. The expanded solution now incorporates threat intelligence from a variety of commercial and community best-of-breed threat intelligence offerings including Check Point Software,...

Read More
Adapt celebrates Cyber Essentials PLUS certification

Adapt stands out from the crowd during Cyber Essentials assessment.

Read More
NEWS
A single data protection law for Europe - what does it mean?

EU Parliament has announced that wants single data protection law in place by end of 2015. This...

Read More
NEWS
Cybersecurity hub promises single standards database

The hub will be the first of its kind, enabling companies to quickly scope, define and maintain all...

Read More
NEWS
Capgemini Group launches Cybersecurity Global Service Line

New Group wide initiative will enable organisations to embrace digital transformation securely.

Read More
NEWS
One billion data records compromised during 2014

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with...

Read More
NEWS
Arbor Networks partners with Zycko

Network security provider expands EMEA Distribution Channels.

Read More
Fortinet joins the VMware NSX Partner Ecosystem

Fortinet has joined the VMware NSX™ partner ecosystem and has also revealed its new...

Read More
BeyondTrust expands EMEA channel focus in 2015

New senior executive appointment, updated partner portal, training and certification enhancements...

Read More
Advanced threat analytics addition

BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that...

Read More
NEWS
FireHost teams with Dell

FireHost will be teaming with Dell Services to deliver secure, fully managed private cloud services...

Read More

Videos

Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how storage can improve an enterprise’s environmental footprint.

Expert Opinions

By Michael Hunger, VP of Product Innovation, Neo4j.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By David Higgins, Senior Director, Field Technology Office, CyberArk.