CA Technologies enhances Privileged Access Management portfolio

CA Technologies has released significant enhancements to its comprehensive privileged access management portfolio, giving customers control over the privileged accounts that support a hybrid IT environment and are a frequent vector for cyberattacks.

Read More
NEWS
Survey reveals frequency of information security breaches

Respondents point to unsecured network file folders as the biggest vulnerability point leading to unauthorised disclosure of confidential information.

Read More
ForeScout and Rapid7 help to reduce attack surface

ForeScout Technologies has introduced the ForeScout Extended Module for Rapid7 Nexpose, an industry-leading, live vulnerability management solution. The ForeScout Extended Module allows joint customers to leverage Nexpose to scan for vulnerabilities and mitigate threats stemming from...

Read More
BullGuard acquires “Security of Things” pioneer Dojo Labs

BullGuard has acquired Dojo Labs, the pioneering innovator in consumer internet of things security. Together, the companies will redefine how security is delivered for consumers and small businesses. Terms of the transaction were not disclosed.

Read More
NEWS
DNSSEC reflection severe DDoS risk

DNS and DDoS mitigation service provider exposes widespread DNSSEC amplification vulnerabilities;...

Read More
BeyondTrust introduces PowerBroker Password Safe Version 6.0

New release features Active/Active targeted password change, DirectConnect for seamless SSH...

Read More
Cybersecurity certification program

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for...

Read More
White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the...

Read More
Only 8% of Asian nations are safe for data privacy

Only four Asian nations are considered truly secure for data storage, according to a new report by...

Read More
Now available: ThreatConnect powered by SAP HANA

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More
NEWS
Data theft rising sharply

Three out of every four organisations have been hit by the loss or theft of important data over...

Read More
DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to...

Read More
BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for...

Read More
CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically...

Read More

Videos

Data Centre World Frankfurt 2026
Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Ben Pritchard, CEO of AVK, discusses the launch of what is believed to be Europe’s first, large-scale, 110 MW on-site microgrid, developed to support early phase site operational resilience. Located within...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
Connectivity, Not Compute, Will Decide the AI Race. By Mahesh Krishnaswamy, Founder and CEO of Taara.
By Inna Weiner, VP of Product, Data & AI, AppsFlyer.