NEWS
Social engineering is used in every third attack

According to experts, the number of reports of personal data leaks continued to grow in Q4 2018, and social engineering was found to be used in one in three attacks.

Read More
NEWS
Threat report reveals adversary rankings

CrowdStrike reveals the adversaries with the fastest breakout time.

Read More
NEWS
Venafi and nCipher Security partner

Venafi and nCipher Security have formed a new technology partnership and integration. The integrated solution combines Venafi Advanced Key Protect with nCipher nShield hardware security modules (HSMs) and can be used to scale the generation and protection of machine identities – even in complex,...

Read More
NEWS
Secure access for hybrid IT

Pulse Secure has announced the integration of SDP (Software Defined Perimeter) architecture within its Secure Access platform and the inclusion of Pulse SDP as an add-on within its award-winning Access Suite. By offering a flexible path to SDP, the company extends its foundation of Zero Trust...

Read More
NEWS
Armor bolsters protection of SaRA Health’s patient data

SaRA Health, a cutting-edge healthcare technology startup company, has chosen Armor’s managed...

Read More
NEWS
UK businesses optimistic about data regulation

Businesses see positive impact of data regulation and develop their data privacy awareness.

Read More
NEWS
ONl a third of organisations confident of avoiding a data breach

Balbix Inc., provider of the security industry’s first system built for avoiding breaches, has...

Read More
NEWS
(ISC)² invests in the professional development of global cybersecurity workforce

Association establishes first-of-its-kind Professional Development Institute to extend training...

Read More
NEWS
Betting on compliance

Governing diverse data sources with speed on Microsoft Azure, Talend helps support the delivery of...

Read More
NEWS
Cyberattacks could close down SMBs

44% of decision makers are spending a day each week dealing with cybersecurity issues.

Read More
NEWS
DigiCert and Utimaco work on securing the future of IoT from quantum computing threats

Proof of concept lays a foundation for quantum-resistant digital certificates for IoT devices.

Read More
NEWS
Qualys teams with IBM X-Force Red

Collaboration enables organizations to remediate critical vulnerabilities within minutes.

Read More
NEWS
Average DDoS attack volumes have trebled in past year

Cybercrime on the rise: average attack volumes grew by 194%, and hyper-scale volumes by 150%...

Read More
NEWS
Almost 9- percent of UK businesses have suffered a data breach

Carbon Black has released the results of its second UK Threat Report. The research indicates that...

Read More
NEWS
New platform aims to transform cybersecurity

A new software platform aims to transform cybersecurity by allowing managers to monitor the whole...

Read More

Videos

Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Prakash Govindan, Gradiant’s co-founder and COO, discusses the challenges facing both the data centre and semiconductor industries when it comes to water usage. The company is currently working with two data...
Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...

Expert Opinions

By David Higgins, Senior Director, Field Technology Office, CyberArk.
By Stuart Farmer, Sales Director at Mercury Power.
By Michael Hunger, VP of Product Innovation, Neo4j.