NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More
NEWS
Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior...

Read More
NEWS
Security by design – is it just a pipe dream?

Nigel Thorpe, technical director at SecureAge Technology questions whether security by design will...

Read More
NEWS
Three reasons the security industry is protecting the wrong thing

Why is it that the security industry talks about network security, but data breaches? It’s clear...

Read More
NEWS
If you’re not doing MFA – ask yourself, why not?

By James Preston, Security Architect for ANSecurity.

Read More

Videos

Michael Crabb, SVP Commercial, Last Energy, talks through the energy start-up’s micro-scale nuclear power plant - a central component of the company's 20 MW modular power plant, which can be developed within...
Leah Goldfarb, Environmental Impact Officer at Platform.sh, explains the importance of being able to identify truly green data centres as organisation’s develop their own sustainability objectives and also...
Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...

News

Cato Networks has unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report shows all organisations surveyed continue to run insecure protocols across their wide access...
XM Cyber has released the findings of its third annual research report, Navigating the Paths of Risk: The State of Exposure Management.
In response to evolving cyber threats, Graylog has released Graylog Security 6.0 to help enterprises combat continuous cyber threats. The updated solution provides intuitive and cost-effective threat detection...
Over 40% of OutSystems developers use AI to guide them through the software development life cycle.