Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More
Akamai Cloud Security Intelligence is the foundation for new services

Recognising the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its award-winning Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai...

Read More
AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily.

Read More
Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship...

Read More
FireMon acquires mmediate Insight to expand security solutions portfolio

Acquisition delivers first-ever combination of proactive network security intelligence and...

Read More
Clavister secures deal with world’s largest bulb mediator

Clavister has given details of a deployment with CNB (Coöperatieve Nederlandse...

Read More
Data security - top tips for senior managers

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved...

Read More
NHS Dumfries and Galloway adopts a proactive approach to safeguarding patient data

Guarding against security threats with a state-of-the-art vulnerability management solution.

Read More
Blue Coat enhances security for dominant cyber espionage attack vector

Blue Coat Systems has added Mail Threat Defense to its portfolio of Advanced Threat Defense (ATD)...

Read More
Genetec announces expansion of Enterprise Cloud Services portfolio

Genetec is continuing to expand its cloud services portfolio.

Read More
Majority of IT pros don’t see senior management taking enough responsibility for insider threat

IS Decisions report finds that IT professionals want more involvement from senior management on...

Read More
Singtel to acquire Trustwave

New strategic investor to help take Trustwave to the next level by accelerating growth.

Read More
Protectig digital information everywhere

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...

Read More
BeyondTrust helps University of Winchester strengthen security without hampering productivity

Least privilege model reduces security risk and supports overhead for a top 20 university.

Read More

Videos

Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.