ForeScout and Rapid7 help to reduce attack surface

ForeScout Technologies has introduced the ForeScout Extended Module for Rapid7 Nexpose, an industry-leading, live vulnerability management solution. The ForeScout Extended Module allows joint customers to leverage Nexpose to scan for vulnerabilities and mitigate threats stemming from...

Read More
NEWS
DNSSEC reflection severe DDoS risk

DNS and DDoS mitigation service provider exposes widespread DNSSEC amplification vulnerabilities; Average DNSSEC amplification is nearly 30 times greater than requests.

Read More
BullGuard acquires “Security of Things” pioneer Dojo Labs

BullGuard has acquired Dojo Labs, the pioneering innovator in consumer internet of things security. Together, the companies will redefine how security is delivered for consumers and small businesses. Terms of the transaction were not disclosed.

Read More
BeyondTrust introduces PowerBroker Password Safe Version 6.0

New release features Active/Active targeted password change, DirectConnect for seamless SSH...

Read More
Cybersecurity certification program

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for...

Read More
White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the...

Read More
Only 8% of Asian nations are safe for data privacy

Only four Asian nations are considered truly secure for data storage, according to a new report by...

Read More
BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for...

Read More
NEWS
Data theft rising sharply

Three out of every four organisations have been hit by the loss or theft of important data over...

Read More
DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to...

Read More
Now available: ThreatConnect powered by SAP HANA

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More
CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically...

Read More
BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies,...

Read More
A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity...

Read More

Videos

Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Mike Slevin, Senior Director Field Sales EMEA/GM, Fluke Corporation, discusses the launch of the company’s Versiv Data Center Kits that are designed to keep data centres up and running by identifying copper...

Expert Opinions

By Kyle Hauptfleisch, Chief Growth Officer, Daemon.
By Dave King, Product Engineering Architect at Cadence.
By Joel Carusone, SVP Data and AI at NinjaOne.