NEWS
84% of UK CIOs and CISOs hold back from making critical updates to keep the business running

Latest Tanium research highlights the IT security and operational trade-offs that UK CIOs and CISOs face in protecting their business from disruption.

Read More
NEWS
Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More
NEWS
Privacy concerns grow

Nearly three out of four Brits are more alarmed than ever about their privacy, but many are willing to accept risks to make their lives easier.

Read More
NEWS
Report focuses on insider threats

Bitglass, the Next-Gen CASB company, has just released Threatbusters, its 2019 Insider Threat Report. In partnership with a leading cybersecurity community, Bitglass surveyed IT professionals about insider threats, as well as what their organisations are doing to defend against them.

Read More
NEWS
Safeguard your business from evolving malware attacks

Barracuda researchers have uncovered an alarming new rise in the use of document-based malware. A...

Read More
NEWS
Aqua Security closes $62m in funding

Led by Insight Partners, the investment round will enable Aqua to expand its platform and market...

Read More
NEWS
Financial institutions fail to protect mobile apps

Research highlights a systemic failure to protect financial services apps against multiple...

Read More
NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate...

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’...

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes...

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and...

Read More

Videos

Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Matt Evans, CEO at Apx Data Centre Solutions.