NEWS
ManageEngine launches Security and Risk Posture Management in its SIEM solution

Organisations can now mitigate internal attacks and prevent intrusions proactively.

Read More
NEWS
ExtraHop unveils blueprint for effective NDR

New insights highlight five key capabilities to enhance your security strategy.

Read More
NEWS
Mobile phishing attacks at an all time high?

More than 30% of enterprise and personal users were exposed to mobile phishing attacks every quarter; highly regulated industries most heavily targeted.

Read More
NEWS
Colt and Zscaler boost partnership

Zscaler’s Zero Trust Exchange™ platform is the latest step in Colt’s digital transformation journey, supporting Colt’s ‘Flexible First’ hybrid work strategy and deepening the partnership as the two companies mark ten years of collaboration.

Read More
NEWS
XSIAM enables security teams to further consolidate disparate SOC products

Palo Alto Networks has launched its new Identity Threat Detection and Response (ITDR) module for...

Read More
NEWS
Hewlett Packard Enterprise acquires Security Service Edge provider Axis Security

Hewlett Packard Enterprise has entered into a definitive agreement to acquire Axis Security, a...

Read More
NEWS
Summa Equity invests in Logpoint

Summa Equity has acquired a majority stake in Logpoint, the creator of a reliable, innovative...

Read More
NEWS
European businesses are being targeted by Trojans as shift to cloud continues

Attackers are increasingly abusing cloud apps as a malware delivery channel in Europe with an...

Read More
NEWS
ThreatQuotient selected by Sysdig

Sysdig has standardised on the ThreatQ Platform for data-driven security operations, saving time...

Read More
NEWS
WithSecure’s new tech is an ‘undo’ button for ransomware

WithSecure’s Activity Monitor technology rolls back changes to data caused by malware.

Read More
NEWS
Securing critical infrastructure without additional sensors

The usage and connectivity of operational technology (OT) is rapidly growing as are the number of...

Read More
NEWS
Cyolo introduces enhanced Partner Program “Cyolo Connected”

The company is expanding its custom partner program, providing extensive support to accelerate...

Read More
NEWS
Report reveals state of global threats

Emerging threat actors and increasing China-nexus activity drive a surge in identity and cloud...

Read More
NEWS
Radiant Logic introduces Identity Data Intelligence innovation

Radiant Logic has launched its radically redesigned Identity Data Platform, offering an...

Read More
NEWS
AI-powered OT security 'easy to adopt'

New Zero Trust OT Security solution secures critical infrastructure without additional sensors.

Read More

Videos

Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Vivek Behl, Vice President, Strategy at WalkMe, discusses the findings of the company’s annual report, The State of Digital Adoption 2025, Special AI Edition. This year’s report focuses on AI adoption in...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Peter Miller, Sales Manager at ETB Technologies.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
By Yuval Moss, Vice President of solutions for Global Strategic Partners, CyberArk.
By Chris Carreiro, CTO at Park Place Technologies.