Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data across cloud and on-prem data lakes .

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR solution. Attacker Behaviour Analytics are detections that reveal unknown variants of successful attacker techniques, and are continually crafted by Rapid7’s global security analysts and threat...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises accelerate and bolster their security capabilities as they move toward a more agile and mature security model, so they can contend with a rapidly evolving security threat landscape.

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user.

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
NEWS
Transavia keeps business flying with One Identity

Dutch airline reduces provisioning time for large, seasonal workforce.

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More
Unisys appoints Mathew Newfield as Chief Information Security Officer

Former IBM security leader brings wealth of experience working in both internal and client-facing...

Read More

Videos

Tom Artinian, CEO and President of TiniFiber, shares the company’s vision and mission which centres on delivering ultra-rugged, high-speed fiber cabling, connectivity, tools, and solutions that enable...
Omer Wilson, Chief Marketing Officer at Start Campus, discusses the findings of a recent study, conducted by Start Campus and Copenhagen Economics, which reveals that the Portuguese data centre sector could...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...

Expert Opinions

By Mohammad Ismail, VP of EMEA, Cequence Security.
Dr Richard Lewis from Prysmian highlights the vital importance of power infrastructure.
By Eric Herzog, CMO at Infinidat.
By Rosemary J Thomas, Senior Technical Consultant, AI Labs, Version 1.