Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the combined Bit9 and Carbon Black real-time endpoint and server security solution with Check Point’s next-generation firewall and threat emulation offerings.

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Tech Data promotes Andy Gass

Tech Data says that Andy Gass will become Managing Director UK and Ireland, after spending the past...

Read More
Lancope introduces StealthWatch Labs security updates

Security updates from Lancope’s research team help customers combat today’s...

Read More
AlgoSec partners with Qualys

New integration delivers application-centric vulnerability management, aggregating and scoring...

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
Das Netzwerk als Business Enabler:Cloud-basierte Sicherheitslösungen machen’s möglich

Internetsicherheit ist in den letzten Jahren immer mehr zu einem beweglichen Ziel geworden. Das...

Read More
Tangible business returns from formalised mobility strategies

Global survey of business and IT decision makers reveals that special class of “mobile...

Read More
Get chooses Proact

Get services and equipment which have been outsourced to a third party up to now are being brought...

Read More
Logicalis completes IT overhaul for Birmingham City University

Logicalis has completed a comprehensive IT infrastructure overhaul for Birmingham City University....

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
Step change in digital technology investment predicted for 2014

A step change in digital technology investment is predicted this year after Virgin Media Business...

Read More

Videos

Andy Venables, CEO at POPX, discusses the findings of a new survey of 250 MSP leaders by POPX, which reveals a significant shift in expectations for MSPs in 2026. Unsurprisingly, security and AI featured...
Welcome to the WinStar Introductory Presentation!
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

By Peter Miller, sales manager and refurbished technology expert, at ETB Technologies.
By Patrycja Sobera, Senior Vice President and General Manager, Digital Workplace Solutions, Unisys.
By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
By Sadiq Syed, SVP Digital Buildings, Schneider Electric.