Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The CSI Suite, launched at Black Hat Europe 2015, brings together the company’s leading system and application Log Management, Privileged User Monitoring and User Behaviour Analytics tools into an...

Read More
Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured from multiple, simultaneous attackers.

Read More
Omada & Balabit partner

Omada and Balabit each provide unique innovative solutions within IT Security and Compliance. ...

Read More
VoiceTrust and USoft merge to form BioTrust

New company couples extensive biometrics IP with mature business application development expertise.

Read More
Tenable Network Security raises $250 million

Series B funding led by Insight Venture Partners and Accel will help accelerate development of the...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10...

Read More
NEWS
Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated...

Read More
NEWS
Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member...

Read More

Videos

Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...
In this conversation, Bill Andrews, President and CEO of ExaGrid, discusses how Tiered Backup Storage is helping MSPs improve performance, strengthen ransomware protection, and scale efficiently. He explains...
Antti “Jogi” Poikola newly appointed Managing Director of the Finnish Data Center Association (FDCA), explains how Finland has an exceptional opportunity to become a leading country in sustainable digital...
In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...

Expert Opinions

By Matt Middleton-Leal, Regional Vice President EMEA, Qualys
AI growth makes datacenters prime targets for drones, requiring radar-led, multi-sensor airspace security to detect threats, prevent disruptions, and protect critical infrastructure. By Kara Quesada,...
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.