How advanced targeted attacks evolved in Q2, 2017

The second quarter of 2017 saw sophisticated threat actors unleash a wealth of new and enhanced malicious tools, including three zero-day exploits and two unprecedented attacks: WannaCry and ExPetr. Expert analysis of the last two suggests the code may have escaped into the wild before it...

Read More
'Frictionless' security

One Identity Safeguard 2.0 is first in the industry to offer “Approval Anywhere,” a cloud-based approval workflow that enables security professionals to approve password requests from any device.

Read More
Information security challenges holding back innovation in the financial services sector

New research reveals that information security is the most common challenge facing IT departments in the financial services sector, with almost 6 out of 10 seeing it as a primary point of concern.

Read More
NTT Security strengthens senior management team in EMEA

NTT Security, the specialised security company of NTT Group, has announced changes to its ...

Read More
Fuzz tests focus on IoT and industrial vulnerabilities

Synopsys has released its fuzzing report, which provides deep analysis on potential zero-day...

Read More
ANSecurity helps healthcare organisations across Lincolnshire save over ?100,000 annually

Shared service model improves security and accessibility while dramatically reducing licencing...

Read More
NEWS
Cyber attacks occurring more frequently and with greater sophistication

The frequency and sophistication of cyber attacks continues to rise globally according to...

Read More
Steganography - the next big security threat?

While analysing multiple cyberespionage and cybercriminal campaigns, Kaspersky Lab researchers...

Read More
NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware...

Read More
NEWS
Data loss is the major Cloud concern

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017...

Read More
PAM platform available on Google Cloud

Broad cloud support is a BeyondTrust priority, having the only complete PAM platform available on...

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access...

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT...

Read More

Videos

We spoke with Adrian Lam from Hetone at Data Centre World Frankfurt 2025 to hear about the company’s presence at the event and their involvement in the data centre industry. Watch the full interview to...
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
Brian Rhoney, Data Center Market Development Manager at Corning Optical Communications, explains how operators face challenges of scale and density in meeting the infrastructure requirements of AI, both inside...

Expert Opinions

By Hans Nipshagen, Vice President Channel at nLighten.
By Chris Wysopal, Co-founder and Chief Security Evangelist at Veracode.
By Daniel Sukowski, Global Business Development Industry & IIOT, Paessler GmbH.