Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables customers to rapidly extract security metadata, including Indicators of Compromise (IOC), and fast-track that information to reporting tools to speed Mean Time to Identify (MTTI) and Mean Time to...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More
Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack detection, and automated remediation for devices outside of the core network.

Read More
Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all accreditation requirements across Durham and thwart data breaches.

Read More
NEWS
Employees consistently flout security policies, say IT managers

Despite investment in cyber security, employees are still putting organisations at risk,...

Read More
NEWS
Tech giants collaborate on zero outage

Founding Members Brocade, Cisco, Dell EMC, Hitachi Data Systems (HDS), Hewlett Packard Enterprise...

Read More
Swamped by security

Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...

Read More
Pulse Secure adds device discovery and profiling

Highly automated advanced detection and classification of managed and unmanaged devices secures...

Read More
Datto launches ransomware protection

Datto unveils automatic ransomware detection and recovery for small, midsized businesses.

Read More
Atos offers global prescriptive threat detection and instantaneous remediation

Atos has revealed a new managed security service provider (MSSP) partnership with Intel Security....

Read More
NEWS
SonicWall spins out from Dell Software Group

Francisco Partners and Elliott Management complete acquisition of Dell Software Group; spin out...

Read More
Flex Tap to fortify business critical application security

Ixia has introduced the latest addition to the company’s reliable network taps family of...

Read More
Recovering ransomware-encrypted files without a backup

ExtraHop has introduced a new version of its award-winning ransomware mitigation offering that,...

Read More
AppGate upgrade

Cryptzone has introduced the newest version of AppGate that empowers companies with a...

Read More
NEC establishes security operations centre in Austria

NEC Corporation and Infosec Corporation, a specialized security company belonging to the NEC...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Eric Herzog, Chief Marketing Officer at Infinidat, shares his future predictions about enterprise storage that CTOs should take into consideration and also advises as to what enterprises should be thinking...

Expert Opinions

As Official Partner of the Ferrari Hypercar team, ServiceNow’s AI Platform powers Ferrari’s global operations, supporting real-time race operations and connecting employees, dealers, suppliers, and...
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By David Trossell, CEO and CTO of Bridgeworks.
By Myles Leach, Managing Director NFON.