Security orchestration

Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across heterogeneous networks.

Read More
Alert Logic launches Cloud-native vulnerability and configuration management solution on Amazon Web Services

Alert Logic has introduced Alert Logic Cloud Insight, a cloud-native vulnerability and configuration management solution designed for customers running on Amazon Web Services (AWS). Alert Logic Cloud Insight integrates with AWS native security features to provide an integrated view of potential...

Read More
CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most...

Read More
Top five ways to increase business IT security

By Roger Keenan, managing director of London data centre, City Lifeline.

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR)...

Read More
Blue Coat acquires Perspecsys  

Expands portfolio in exploding cloud security market, providing relief for multinational...

Read More
Gemalto enables service providers to offer trusted crypto in the cloud

Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Huawei establishes an Open Platform Ecosystem for the finance industry

Huawei will partner with eleven of the world’s leading banking IT solution providers to...

Read More

Videos

Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By Troels Rasmussen, GM of Security, N-able.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.