High-Tech Bridge releases application security trends report

The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

Read More
Mainframe more secure than other systems

80% of retail organizations rely only on log-files to detect insider threats on the mainframe, exposing themselves to data breaches.

Read More
Processing the rising tide of encrypted internet traffic

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations overcome the challenges of providing advanced SSL decryption and encryption for both application acceleration and security visibility.

Read More
NEWS
Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More
Trojan Horse warning

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt...

Read More
Kaspersky launches Security Cloud

Every person is unique and, just like their fingerprints, everyone’s digital life is...

Read More
Patches far from perfect

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from...

Read More
Vectra collaborates with VMware

Delivering visibility into hidden cyber attacker behaviours throughout virtualised environments.

Read More
Deloitte and LogRhythm join forces to provide advanced cyber security solutions

Deloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly...

Read More
Software AG unveils GDPR Framework

Provides critical capabilities and solid foundation for GDPR compliance.

Read More
East Sussex Healthcare NHS Trust upgrades secure access to reduce costs and complexity

Multi-vendor solution delivers self-service tools and simplified two factor authentication while...

Read More
Number of fines for UK data privacy issues doubles and totals ?3.2m

The UK was one of the most active regions for regulatory enforcement action in Europe last year,...

Read More
NEWS
Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals...

Read More
BeyondTrust supports Microsoft Azure

PowerBroker Privileged Access Management and Retina Vulnerability Management solutions now...

Read More
IT & telecoms firms risk damaging fines

Almost half (44%) of IT & telecoms companies are unaware of the new wide-ranging data...

Read More

Videos

As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...
In this interview, Josh Ewing, VP of eNlighten Managed Services at Namos Solutions, discusses how managed services are evolving beyond traditional break-fix models towards value-led, outcome-focused delivery....
Matt Wilkins, Global Director of Design and Engineering at Colt DCS, explains that data centre operators need ‘controlled flexibility’ now more than ever, as tightened regulatory environments, skills gaps,...

Expert Opinions

Subzero Engineering discusses why Asia-Pacific is fast becoming the proving ground for next-generation data center infrastructure.
By Michael Poto - Product Manager - Global Chilled Water Systems at Vertiv.
Researchers developed a system that intelligently balances workloads to improve the efficiency of flash storage hardware in a data center.