Corero delivers turnkey DDoS visibility and analytics

Corero Network Security has announced the availability of Corero SecureWatch ™ Analytics, a powerful Web-based security analytics portal. The solution delivers turn-key visibility into DDoS attacks and cyber threats with comprehensive and easy-to-read security dashboards powered by...

Read More
Tech Data takes on Symantec security portfolio

Tech Data Europe says that its distribution agreement with Symantec in the UK, Belgium and the Netherlands has been extended to cover Symantec’s full range of security, information management and availability solutions. As part of the agreement, resellers will now be able to purchase across...

Read More
Mobile malware targets trust

Cybercriminals exploit Flappy Bird game’s popularity, other trusted app and service vulnerabilities.

Read More
Virgin Media Business continues to safeguard public data

Virgin Media Business has been re-certified to supply secure services to public sector organisations for another three years.

Read More
Enterprise search adoption remains low

Despite the employee productivity benefits that internal enterprise search could bring to any...

Read More
UK IT managers increasingly aware of insider access threats

UK CISOs and IT Managers feel isolated and fearful of losing jobs as data breach wave rolls in,...

Read More
Deploying and managing enterprise applications ‘faster and easier’

Four new appliances and integrated systems help companies of all sizes quickly stand up...

Read More
Organisations overwhelmed by increased security complexities

AccessData says that it has bridged the security gap between prevention-focused mobile device...

Read More
Organisations blind to location of sensitive data

Informatica Corporation has announced the availability of a new independent research report by the...

Read More
Skyhigh secures high finance

Existing investors Greylock Partners and Sequoia lead the round; funding will help Skyhigh meet the...

Read More
Verizon unveils "Smart Credential" solutions for authenticating users to help stem data breaches

Data breaches continue to be in the news. In fact, according to the Verizon 2014 Data Breach...

Read More
Next generation Threat Intelligence Services

Webroot has announced expansion of its enterprise-class security solutions with the introduction of...

Read More
Avaya evolves Avaya Connect Channel Partner Programme

Introduces six new Solution Expert designations and restructures Silver, Gold and Platinum level...

Read More
Securing your infrastructure in a 24/7 economy

By Poul Nielsen - Director of Strategy, Nexthink.

Read More
Insecurity in existing endpoint protection deployments

Survey of 300 information security practitioners highlights challenges securing end users.

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCS talks to Paul Quigley, President of Airsys Cooling Technologies. Paul also holds the executive leadership position at Airsys Global Group overseeing Sales and Marketing. In this interview, Paul discusses...

Expert Opinions

By Cody David. Head of AI and Innovation. Syniti - part of Capgemini.
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.
By Steve Leeper, VP of Product Marketing, Datadobi.
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.