NEWS
Paying the ransom is still the most common response to a ransomware attack

Although progress has been made, organisations are still paying out.

Read More
NEWS
Cybersecurity professionals fear severe disruption from CNI cyberattacks

New research from Forcepoint exposes how CNI cybersecurity professionals need greater support to prevent burnout from the pressure of securing high-threat, high-complexity environments.

Read More
NEWS
Neustar Security Services expands partner network in EMEA

New partners help joint customers enhance security and improve resilience.

Read More
NEWS
New data reveals nearly half of businesses are just beginning to address identity security

SailPoint Technologies Holdings has unveiled the findings of a new research report titled, ‘The Horizons of Identity.’ As hyper innovation and rapidly evolving technologies drive global organisations, mature identity programs are becoming business essential to secure and enable digital...

Read More
NEWS
Ransomware attacks continue to increase

20% of all reported attacks occurred in the last 12 months.

Read More
NEWS
Confidence grows in addressing hybrid security challenges

84% of IT professionals have some degree of confidence in their user access security systems to...

Read More
NEWS
Allurity acquires Aiuken Cybersecurity

Allurity has acquired Spanish multinational Aiuken Cybersecurity, as an important step in its...

Read More
NEWS
Commvault enables early threat detection and zero loss strategy

A first among data protection vendors, the new cyber deception service detects and contains...

Read More
NEWS
Solent NHS Trust selects Atos for managed digital workplace and security services

Atos has been awarded a three-year contract with Solent NHS Trust to manage, support and secure its...

Read More
NEWS
ThreatQuotient enhances data-driven automation capabilities

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses...

Read More
NEWS
Aqua Security targets software supply chain attacks

Development and security teams can now proactively address the most critical software supply chain...

Read More
NEWS
CrowdStrike to acquire Reposify

Reposify’s external attack surface management (EASM) capabilities expand CrowdStrike’s robust...

Read More
NEWS
Data sovereignty strategies embraced by 98% of IT decision makers

Almost half surveyed say they are using hybrid cloud or local cloud service providers as an...

Read More
NEWS
2022 Cybersecurity Census Report reveals lack of preparedness against rising cyberattacks

Almost one in five (17%) UK businesses are subjected to approximately two cyberattacks every...

Read More
NEWS
Security and compliance challenges hinder innovation

58% of executives report a “shift left” approach is a burden on developers.

Read More

Videos

David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...

Expert Opinions

By Sam Kirkman, Director of Services for EMEA at NetSPI.
By Dave King, Product Engineering Architect at Cadence.
By Pascal Lemasson, AVP Business Development and Sales - Europe at MediaTek.
By Justin Day, Chief Product Officer and Co-Founder of Cloud Gateway.