Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of privileged accounts.

Read More
ThreatConnect now provides one place to visualise intelligence and operations

ThreatConnect Dashboards and other features in latest release allow customers to analyse all relevant intelligence and metrics within ThreatConnect.

Read More
Validating end-to-end network security access for Cloud environments

Ixia has launched BreakingPoint Cloud, a SaaS solution that safely models data breaches and threat vectors to deliver quantifiable evidence and insights into the effectiveness of organizations’ cloud-based data and application security, whether private, public or hybrid.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises...

Read More
GDPR confusion

Businesses more concerned with security costs than meeting ‘State of the Art’ requirement.

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More
Riverbed and Zscaler deliver unified Cloud networking and security solution

Seamless integration of Riverbed SteelConnect SD-WAN and Zscaler cloud security platform...

Read More
Ransomware to rule

Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased in 2017.

Read More
NEWS
Global CISOs concerned about cybersecurity readiness

Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...

Read More
NEWS
Dark web dangers

Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...

Read More
Security challenges delay enterprise migrations to the Cloud

Enterprises embracing hybrid cloud, but need better visibility and security management processes to...

Read More
NEWS
Reducing the risk of data breaches

Centrify encourages businesses to increase their Identity and Access Management maturity to...

Read More
Cyber security start-up aims to simplify cyber security for SMEs

A tech start-up is aiming to simplify cyber security with the launch of its new automated software...

Read More

Videos

Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Lizzy McDowell, Director of Marketing at Kao Data, discusses the launch of the company’s Critical Careers: Celebrating Women in Digital Infrastructure – a new campaign highlighting the stories,...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...

Expert Opinions

By Carl Windsor, Chief Information Security Officer, Fortinet.