Financial apps - secure or not?

Two thirds of online banks still have at least one critical vulnerability, even as the numbers decline.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Thunder defeats cyber attacks

A10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder TPS (Threat Protection System) with A10’s Non-stop DNS solution across multiple data centres to ensure resilience from escalating cyber-attacks and scale its mission critical DNS services.

Read More
Security orchestration across major Cloud platforms

As they struggle to deal with the speed of business process automation and the exponential growth of corporate data, 66 per cent of enterprises and 49 per cent of SMBs are planning to expand their hybrid cloud infrastructures. At the same time, every second company feels it cannot fully...

Read More
Tripwire expands Cloud Security capabilities

New functionality tackles publicly exposed cloud data; core secure configuration functionality now...

Read More
Helping to validate Microsoft Azure DDoS Protection Service defences

BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
Legacy email systems - a significant security risk?

Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...

Read More
A10 Networks introduces One-DDoS Protection

A10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only...

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More

Videos

Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...

Expert Opinions

The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Mike Arrowsmith, Chief Trust Officer, NinjaOne.
By Francesco Fontana, Enterprise Marketing & Alliances Director at Aruba S.p.A.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.