Imperva acquires data security assets from Camouflage Software

Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk.

Read More
Lastline upgrades

Lastline has introduced its latest enhancements to Lastline Enterprise for Global 5000 companies. The Spring 2017 Release adds capabilities to detect and eliminate browser based-attacks, speed incident investigation for security professionals, and provide early warning of unusual or...

Read More
Reducing privileged credential risk

CyberArk has issued a new research report that recommends an accelerated 30-day plan to improve protection of privileged credentials. The report outlines a proven framework for rapid risk reduction based on lessons learned from several large data breaches and best practices from a panel of...

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR) creates more transparency on cyber-security.

Read More
Aspire stops DDoS attacks

Aspire Technology Solutions has deployed Flowmon Networks' anti-DDoS intelligence to defend...

Read More
Banks accelerate Blockchain investment

Expect commercial adoption from 2018.

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
RedSeal extends digital resilience platform

RedSeal has introduced enhancements and new integrations for its market leading network modeling...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
NEWS
F5 introduces comprehensive application security solutions for the digital economy

New solutions give customers the protection and intelligence required to keep applications and user...

Read More
Secure Cloudlink appoints former HPE VP, Lee Hughes, as Chief Sales and Marketing Officer

Cyber security specialist, Secure Cloudlink has appointed former Hewlett Packard Enterprise (HPE)...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Certificate-related outages affect 79 percent of businesses

New study from Venafi finds inadequate cryptographic controls significantly impact reliability...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More

Videos

In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...

Expert Opinions

By Paul Speciale, Chief Marketing Officer at Scality.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
By Sean McDevitt, Business Development Leader ICS Cool Energy UK.
By Darren Ellis; Managing Director, EMEA, Park Place Technologies.