BLOG

Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More

BLOG

A question of priorities

Where should cloud-centric organisations focus data protection? By Anurag Kahol, CTO, Bitglass.

Read More

BLOG

Misconceptions around cloud-native security

The most crucial part of any cloud native journey is learning about cloud native security early on in the process. By Rani Osnat, VP Strategy at Aqua Security.

Read More

BLOG

Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More

BLOG

How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the everywhere workplace, which is the future of work. By Nayaki Nayyar, Executive Vice President and Chief Product Officer, Ivanti.

Read More

BLOG

Why openness means better cyber security

The Open XDR movement is gaining traction. By Brian Foster, Vice President of Product Management at ReliaQuest.

Read More

OVHcloud announces its latest security defining feature with advanced Identity and Access...
ISACA launches framework and new portfolio of resources to provide enterprises with the tools to...
Innovative intelligence-based approach uses unique global visibility and automated AI analytics...
CyberX, the IoT and industrial control system (ICS) security company, has enhanced its specialized...
SentinelOne, a global leader in autonomous cybersecurity, has launched a new virtual data centre in...
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more