Encryption-as-a-Service offering

SafeNet, Inc. has announced ProtectV for Service Providers, an encryption solution that lets service providers deliver enhanced data protection and access control to their customers when storing their data in cloud and virtual environments. With analysts predicting that up to 70 percent of...

Read More
Report identifies new patterns in advanced target attacks

Analysis of firsthand experiences of the world’s most renowned cybersecurity forensics teams pinpoints exploitation of privileged accounts as a “signature” in targeted attacks.

Read More
Fortinet joins Equinix Cloud Exchange

Fortinet® has formed an alliance with Equinix, Inc., joining the Equinix Cloud Exchange™ to provide enterprises and service providers the most mature, scalable and reliable security solutions across multiple cloud architectures. Fortinet’s industry-leading, high capacity firewall...

Read More
Don’t let security leave with your staff

By Barry Scott, CTO, EMEA at Centrify.

Read More
Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for...

Read More
eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has...

Read More
Agari and Palo Alto agree to threat intelligence data exchange

Agari has entered into an agreement with Palo Alto Networks, the leader in enterprise security.

Read More
Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation...

Read More
No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of...

Read More
Top five tips for security behaviour management programs

By Scott Greaux, Vice President, Products and Services, PhishMe.

Read More
Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service...

Read More
Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber...

Read More
Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash...

Read More

Videos

Simon Kerr, head of heat networks at EnergiRaven, discusses the recent analysis from EnergiRaven and Viegand Maagøe finds that projected growth in data centres will produce enough waste heat to warm millions...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...

Expert Opinions

By Errol Bull, P.E., CSI, Application Development Leader at Momentive Performance Materials Inc. Member: IIBEC, ASTM C24, ISO TC59/SC8.
By Leonardo Boscaro, EMEA Sales Leader, Nutanix Database.
By Samantha Jennings, Head of Operations, Avella.
By James Gillies, Head of Cyber Security at Logicalis UK&I.