94 percent of IT security professionals using third party apps on their mobiles

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity that are harder for IT to track and manage.

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same...

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
Radware delivers its strongest DDoS mitigation capabilities

Radware®has announced the latest version of DefensePro® – a real-time, behavioural...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement,...

Read More
Dell bolsters Bango’s booming business

Leading provider of mobile billing solutions expands to emerging markets with help from new IT...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the...

Read More
Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public,...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
Innovation agency invests in cyber security

A cluster of companies in the UK’s Severn Valley have been identified in the latest search...

Read More
LogRhythm kommentiert: Bank of England: Hacker soll Schwachstellen aufspüren

Die Gefahr ist real: Internetterroristen trainieren großangelegte Angriffe auf die...

Read More

Videos

Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...

Expert Opinions

By Steve Flavell, Co-CEO and Co-Founder at multinational cloud telephony provider, LoopUp.
By Jon Bance, chief operating officer at Leading Resolutions.
By Gordon Mueller-Schlomka, Optical Connector Product Designer, Corning Optical Communications.
By Darin Patterson, VP of Market Strategy at Make.