Security orchestration

Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across heterogeneous networks.

Read More
Alert Logic launches Cloud-native vulnerability and configuration management solution on Amazon Web Services

Alert Logic has introduced Alert Logic Cloud Insight, a cloud-native vulnerability and configuration management solution designed for customers running on Amazon Web Services (AWS). Alert Logic Cloud Insight integrates with AWS native security features to provide an integrated view of potential...

Read More
CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most...

Read More
Top five ways to increase business IT security

By Roger Keenan, managing director of London data centre, City Lifeline.

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR)...

Read More
Blue Coat acquires Perspecsys  

Expands portfolio in exploding cloud security market, providing relief for multinational...

Read More
Gemalto enables service providers to offer trusted crypto in the cloud

Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Huawei establishes an Open Platform Ecosystem for the finance industry

Huawei will partner with eleven of the world’s leading banking IT solution providers to...

Read More

Videos

Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
In this video, we talk to RiT Tech at the DCA's 10x10 2025

Expert Opinions

By Brenton O'Callaghan, Chief Product Officer, Avantra.
By Rachel Bratt, Senior Consultant, Climate Risk – EcoAct, part of Schneider Electric.
By Rami Jebara, CTO and Co-Founder at Hyperview.
By Jon Bance, chief operating officer at Leading Resolutions.