ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches.

Read More
A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small...

Read More
NEWS
Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More
A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives...

Read More
Kraynak joins Imperva

Mark Kraynak has been appointed Imperva’s Senior Vice President and General Manager of the...

Read More
AlienVault appoints Catherine Kelly as VP of EMEA Sales

Catherine Kelly has joined AlienVault as Vice President of Sales to expand its business...

Read More
Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet...

Read More
Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle...

Read More
Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural...

Read More
Tufin appoints Sales Vice President for EMEA

Tufin has appointed Ian Rigby as Vice President of Sales for the EMEA region. Based...

Read More
OneLogin enhances its cloud-based IAM solution

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new...

Read More
Preventing data exfiltration in real time

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data...

Read More
Exostar launches Cybersecurity Risk Assessment Solution

Exostar has introduced the  Partner Information Manager (PIM), a new, modular solution...

Read More
PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More

Videos

Johan van Hover, Business Manager at Arteco Coolants, outlines the company’s history as a joint venture between Chevron and TotalEnergies and its reputation for high performance coolant technologies,...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, discusses the current business continuity and disaster recovery landscape.
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...

Expert Opinions

By Kyle Hauptfleisch, Chief Growth Officer, Daemon.
By Simon West, General Manager, Network Group.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.
By Justin Day, Chief Product Officer and Co-Founder of Cloud Gateway.