AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats facing their network, devices & users.

Read More
Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More
ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards,...

Read More
Retailers suffer 2x more SQL injection attacks than other industries

Imperva has released the results of the fourth annual Imperva Web Application Attack Report (WAAR),...

Read More
Employees are number one Cyber-security threat

Companies failing to respond to customer demand for proven cyber-security credentials.

Read More
Data security on the road

By Dave Anderson, senior director, Voltage Security.

Read More
Softcat welcomes 36 outstanding new recruits to support growth

Softcat, renowned in the channel for its investment in resource, welcomes 36 new recruits to its...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...

Expert Opinions

By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.
By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.