Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More
Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables customers to rapidly extract security metadata, including Indicators of Compromise (IOC), and fast-track that information to reporting tools to speed Mean Time to Identify (MTTI) and Mean Time to...

Read More
Preparing for privacy

With indicators suggesting that organisations face much work ahead, AvePoint and CIPL partner to provide insight and guidance to ensure readiness for global impact of European data privacy mandate.

Read More
Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all accreditation requirements across Durham and thwart data breaches.

Read More
NEWS
Employees consistently flout security policies, say IT managers

Despite investment in cyber security, employees are still putting organisations at risk,...

Read More
Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack...

Read More
NEWS
Tech giants collaborate on zero outage

Founding Members Brocade, Cisco, Dell EMC, Hitachi Data Systems (HDS), Hewlett Packard Enterprise...

Read More
Swamped by security

Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...

Read More
Pulse Secure adds device discovery and profiling

Highly automated advanced detection and classification of managed and unmanaged devices secures...

Read More
Datto launches ransomware protection

Datto unveils automatic ransomware detection and recovery for small, midsized businesses.

Read More
Atos offers global prescriptive threat detection and instantaneous remediation

Atos has revealed a new managed security service provider (MSSP) partnership with Intel Security....

Read More
Recovering ransomware-encrypted files without a backup

ExtraHop has introduced a new version of its award-winning ransomware mitigation offering that,...

Read More
Flex Tap to fortify business critical application security

Ixia has introduced the latest addition to the company’s reliable network taps family of...

Read More
NEWS
SonicWall spins out from Dell Software Group

Francisco Partners and Elliott Management complete acquisition of Dell Software Group; spin out...

Read More
AppGate upgrade

Cryptzone has introduced the newest version of AppGate that empowers companies with a...

Read More

Videos

In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...
Ben Sooter, Director of Agentic AI Initiatives & Distributed AI Architecture at EPRI, and Bal Aujla, Director, Head of Advanced Research and Engineering, InfraPartners, discuss the collaboration between EPRI,...
Denis Schertenleib, Nexthink’s Senior Director of Product, believes that the IT service desk won’t survive the next five years and that agentic AI will be the future of IT support. He also discusses...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...

Expert Opinions

By Ben Matthews, Senior Director of Engineering at Stack Overflow.
By Brett Candon, VP International at Dropzone AI.
By Matt Middleton-Leal, Regional Vice President EMEA, Qualys
IoT-Enabled Components and the Next Phase of Data Center Infrastructure. By George Connelly, Strategic Business Analyst at Wesgarde.