Fortinet launches Cyber Threat Assessment Program

Analysis of enterprises piloting the program shows that social media and application control demand great vigilance, while banks are favorite targets.

Read More
Cross-Cloud visibility and data protection

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance controls and encryption across a wide range of applications through cloud APIs.

Read More
Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks.

Read More
Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications, products and cloud services with Gemalto's industry-leading authentication, encryption and key management solutions.

Read More
ServiceNow reinvents security response

ServiceNow is extending its industry-leading automation and orchestration expertise to transform...

Read More
85% of enterprises keeping sensitive data in the Cloud

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More
Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security...

Read More
Harrowells Solicitors selects SMS PASSCODE to secure remote working

Harrowells Solicitors, the Yorkshire-based law firm, is working with Danish authentication...

Read More
Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks...

Read More
Insurance a critical component of cyber defence strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to...

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More
50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data...

Read More

Videos

Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, outlines the importance of service productisation and MSP enablement.
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...

Expert Opinions

By Justin Day, Chief Product Officer and Co-Founder of Cloud Gateway.
By Manuel Sanchez, Information Security and Compliance Specialist, iManage.
Nick Rogers, CEO of Exacta Technologies, explores the growing importance for businesses to prioritise on-premises over cloud storage in not only reducing hefty management costs but to ensure complete control...
By Subhashis Nath, AVP and Head of Analytics, Infosys.