NEWS
Safeguard your business from evolving malware attacks

Barracuda researchers have uncovered an alarming new rise in the use of document-based malware. A recent email analysis revealed that 48% of all malicious files detected in the last 12 months were some kind of document. More than 300,000 unique malicious documents were identified!

Read More
NEWS
Aqua Security closes $62m in funding

Led by Insight Partners, the investment round will enable Aqua to expand its platform and market presence, addressing the growing need to secure microservices applications running on containers and serverless infrastructure.

Read More
NEWS
Financial institutions fail to protect mobile apps

Research highlights a systemic failure to protect financial services apps against multiple vulnerabilities.

Read More
NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate data from more than 450 organizations across the globe that participated in Thycotic’s Q4 2018 PAM Maturity Model assessment survey to-date.

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’...

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now...

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes...

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and...

Read More
NEWS
Carbonite closes acquisition of Webroot

Transaction combines data backup and recovery technology with cybersecurity platform to deliver...

Read More
NEWS
Beware the backdoor

69% of security professionals believe countries with government mandated encryption backdoors...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...

Expert Opinions

As data center construction across North America accelerates, projects are becoming larger, faster and more complex than ever before – and the consequences of getting fire safety wrong have never been...
By Paul Speciale, Chief Marketing Officer at Scality.
By Frédéric Godemel, EVP Energy Management, Schneider Electric.