Major gaps in security strategies

Endpoint security seen as key to more integrated approach.

Read More
Ipswitch extends secure file transfer and network monitoring software

Ipswitch has strengthened the ability of IT teams to meet the data security and performance management challenges of today’s hybrid environment.

Read More
Zendesk obtains European BCR approval

Becomes just the second company ever to receive Binding Corporate Rules (BCR) approval through Irish Data Protection Commissioner (DPC).

Read More
Mainframe more secure than other systems

80% of retail organizations rely only on log-files to detect insider threats on the mainframe,...

Read More
NEWS
Ransomware calm before the storm

PhishMe has released its comprehensive malware trends analysis for Q1 2017 as well as announced...

Read More
Veritas unveils new technologies to solve key challenges in the multi-cloud

New solutions provide visibility, simplify migration and protect critical data across clouds...

Read More
NEWS
Vectra Networks identifies healthcare as the industry most highly targeted by cyber attacks

Research finds rates of reconnaissance, lateral movement, and exfiltration detections increased by...

Read More
Gigamon reinforces relationship with Exclusive Group

Network and security visibility vendor consolidates distribution strategy with Exclusive Networks.

Read More
High-Tech Bridge releases application security trends report

The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten...

Read More
Cyphort debuts the Anti-SIEM

First open demonstration of advanced security analytics, advanced threat defense and auto...

Read More
Processing the rising tide of encrypted internet traffic

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations...

Read More
NEWS
Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that...

Read More
Trojan Horse warning

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt...

Read More
Kaspersky launches Security Cloud

Every person is unique and, just like their fingerprints, everyone’s digital life is...

Read More

Videos

In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...

Expert Opinions

By Paul Speciale, Chief Marketing Officer at Scality.
By Jorge Monteiro, CEO of Ethiack.
By Dan Petrillo, VP of Product at BlueVoyant.