NEWS
Organisations that can’t prove the adequacy of risk-based security could fail GDPR compliance

Failing to do so could leave firms having wasted time, money and effort – and facing hefty fines.

Read More
Check Point launches Infinity Total Protection

Game-changing new security deployment model for real-time prevention of threats and cyberattacks.

Read More
Palo Alto Networks delivers Cloud-based behavioural analytics

Palo Alto Networks has introduced Magnifier, a cloud-based behavioral analytics application delivered through Palo Alto Networks Application Framework that allows organisations to rapidly identify and prevent threats.

Read More
Managed threat hunting services in sight

Cb ThreatSight leverages the Cb Predictive Security Cloud (PSC) to deliver managed threat hunting services while empowering the entire Carbon Black ecosystem.

Read More
NEWS
Frequency and complexity of DDoS attacks is rising

NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...

Read More
NEWS
Board members at odds with management on level of GDPR compliance

41% of board level respondents think they have all of the necessary processes in place to be...

Read More
CenturyLink launches Adaptive Network Security Mobility

Secure mobile connectivity solution reduces cyber risks for today's global workforce.

Read More
Bitdefender welcomes Andrew Philpott as VP Enterprise Sales EMEA

Bitdefender has appointed Andrew Philpott as Vice President of Enterprise Sales, Europe, the...

Read More
Palo Alto Networks introduces Cloud-based Logging Service in Europe

Palo Alto Networks has launched its cloud-based Logging Service in Europe. 

Read More
Anaplan launches Bring Your Own Key encryption solution

Anaplan Bring Your Own Key solution gives enterprise customers an additional layer of security...

Read More
WatchGuard Technologies acquires Percipient Networks

Acquisition supports vision of making enterprise-grade security accessible to every...

Read More
CISO - the four approaches

Two-year study explores the roles of information security leaders and how they are affected by...

Read More
One Identity acquires Balabit

Acquisition of Balabit enables One Identity to direct future development and create even more...

Read More
Hybrid DDoS protection

A10 Networks has introduced the A10 DDoS Protection Cloud, powered by Verisign™, and the A10...

Read More
NEWS
Most security pros aim to patch vulnerabilities within 30 days

Only a minority are using automated tools to help them identify unauthorized hardware and software...

Read More

Videos

Rollo Maschietto, Policy Manager, Renewable Energy Association (REA), discusses the ways in which the data centre and energy sectors can work together to ensure delivery of the clean, reliable, and scalable...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Ceasar Anquillare, Chairman & CEO, Winchester Capital, Nora L. Neergaard, Managing Director Europe & Co-Founder of WinStar and Dr David Bowen, Managing Director and Co-Founder of WinStar provide some...

Expert Opinions

By Richard Mitchell, Head of Channel, ThreatAware
Jamie Akhtar, CEO and Co-Founder of CyberSmart
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.