Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network Threat Defense - Virtual Edition  (vNTD Monitor).

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data breaches; healthcare and government overtake retail as most-targeted sectors.

Read More
prpl Foundation demonstrates security by separation for IoT and other connected embedded devices

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal foundation for securing Internet of Things (IoT) and other connected embedded devices.

Read More
Tools4ever introduces IDaaS Cloud solution: HelloID

HelloID combined with Tools4ever’s E-SSOM offers 100 percent single single-on.

Read More
Morgan Lewis expands Global eData Service offerings with EU data centre launch

eData team to host webinar on the current state of EU data privacy law and the firm’s new EU...

Read More
17 per cent of IT managers admit to hacking

Absolute® Software has published the results of a research report the company conducted among...

Read More
Nexsan adds Web browser access

Nexsan says that its family of Transporter private cloud file sync and share...

Read More
Tripwire debuts Online Security Application Exchange Platform

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More
CensorNet acquires SMS PASSCODE

Acquisition will accelerate company’s global expansion and seize the market opportunity for a...

Read More
NEWS
Borica-Bankservice selects Vormetric

Vormetric has published details of a new deployment of data encryption solutions for...

Read More
Firewall innovations

As global companies embrace new digital business opportunities, cybersecurity is regularly cited as...

Read More
Gemalto launches M2M Cat 1 LTE module

Gemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced...

Read More
NEWS
Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and...

Read More
IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Rollo Maschietto, Policy Manager, Renewable Energy Association (REA), discusses the ways in which the data centre and energy sectors can work together to ensure delivery of the clean, reliable, and scalable...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...

Expert Opinions

By James Preston, Principal Security Consultant at ANSecurity.
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By Martin Jakobsen, Managing Director, Cybanetix