NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware strains using SSL to encrypt activity.

Read More
NEWS
Data loss is the major Cloud concern

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017 Spotlight Report,” that explores the latest cybersecurity trends and organisational investment priorities among companies in the UK, Benelux and Nordics.

Read More
NEWS
DDoS attacks are longer and 'more demanding'

The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The longest attack in the quarter was active for 277 hours (more than 11 days) – which is a 131 per cent increase compared to Q1. This is so far a record for the year, says the Q2 2017 botnet DDoS...

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments.

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT...

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
NEWS
Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of...

Read More
NEWS
DDoS attacks on the increase

Financially motivated DDoS attacks driven by criminal extortion have garnered security...

Read More
NEWS
McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More
Making a drama out of security

Forcepoint Cloud Security enhances process, people and technology readiness to combat ransomware...

Read More
IT teams and the C-suite must work together to deliver comprehensive cyber-security

Cyber-security is rarely out of the news these days, with large businesses and organisation...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
DCW Asia 2025 - Part 1 of 3
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...

Expert Opinions

By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.