Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More
Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks...

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make...

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More
Innovative ICT infrastructure is the foundation of a better connected smart nation

Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.

Read More
FortyCloud available IBM’s Cloud Marketplace

FortyCloud for IBM provides an extensive security solution to assist IBM Cloud customers meet...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More

Videos

Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...
Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Troels Rasmussen, GM of Security, N-able.