Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec Messaging Gateway, network threat protection for Mac.

Read More
Splunk turns to Ping Identity

Splunk has selected Ping Identity to provide its customers with simple and secure access to the Splunk customer portal.

Read More
Powering the Cloud celebrates in style

Continues to be the must-attend pan-European event for storage, virtualisation, big data, cloud and...

Read More
Microsoft unveils state-of-the-art Cybercrime Center

Centre of excellence to help defend online safety worldwide.

Read More
IBM to acquire Fiberlink Communications

IBM has announced a definitive agreement to acquire Fiberlink Communications, a mobile management...

Read More
Dell SecureWorks launches Server Protection Services

Dell SecureWorks now provides Server Protection Services for physical, virtual and cloud-based...

Read More
How important is data centre security?

By Bill Walsh, Operations Manager of City Lifeline.

Read More
Trustwave adds to managed security offering

Trustwave has announced new and enhanced managed security services designed to help businesses...

Read More
FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster...

Read More
Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level...

Read More
Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The...

Read More
Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary...

Read More
Information security and risk management holding back UK business innovation

Concerns over security and risk stop project or business ideas progressing in nearly half of all...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

Expert Opinions

By Manvinder Singh, VP of Product Management for AI at Redis.
By Chris Ackerson, SVP of Product at AlphaSense.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.