Veritas unveils new technologies to solve key challenges in the multi-cloud

New solutions provide visibility, simplify migration and protect critical data across clouds with no lock-in.

Read More
Gigamon reinforces relationship with Exclusive Group

Network and security visibility vendor consolidates distribution strategy with Exclusive Networks.

Read More
High-Tech Bridge releases application security trends report

The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

Read More
Processing the rising tide of encrypted internet traffic

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations overcome the challenges of providing advanced SSL decryption and encryption for both application acceleration and security visibility.

Read More
NEWS
Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that...

Read More
Trojan Horse warning

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt...

Read More
Kaspersky launches Security Cloud

Every person is unique and, just like their fingerprints, everyone’s digital life is...

Read More
Vectra collaborates with VMware

Delivering visibility into hidden cyber attacker behaviours throughout virtualised environments.

Read More
Deloitte and LogRhythm join forces to provide advanced cyber security solutions

Deloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly...

Read More
Software AG unveils GDPR Framework

Provides critical capabilities and solid foundation for GDPR compliance.

Read More
Patches far from perfect

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from...

Read More
Number of fines for UK data privacy issues doubles and totals ?3.2m

The UK was one of the most active regions for regulatory enforcement action in Europe last year,...

Read More
NEWS
Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals...

Read More
East Sussex Healthcare NHS Trust upgrades secure access to reduce costs and complexity

Multi-vendor solution delivers self-service tools and simplified two factor authentication while...

Read More
BeyondTrust supports Microsoft Azure

PowerBroker Privileged Access Management and Retina Vulnerability Management solutions now...

Read More

Videos

Nirav Shah, Founder & Director of Technical Excellence at Infrassist, explains that 24x7 IT monitoring and defence is essential for SMBs as an often distributed workforce needs protection around the clock, not...
Falk Weinreich, CEO of Portus Data Centers, discusses the company’s focus on the DACH region, with plans to accelerate expansion of their existing data centre portfolio – most immediately with the...
Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...
John Shultz, Chief Product Officer, AI and Learning Officer for Salute, discusses the company’s collaboration with Ecolab, enabling customers to protect their AI investments by reducing complexity and...

Expert Opinions

Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
By Andrea Pleşea, PhD, Co-founder and COO, Druid AI.