Real-time security analytics addition

A10 Networks has introduced a major upgrade to its groundbreaking multi-­?cloud analytics and management platform, the A10 Harmony Controller. The upgrade expands A10’s advanced security and connected intelligence capabilities via new modular Harmony Apps that support key A10 security...

Read More
Proofpoint launches people-centric cybersecurity innovations

Cybersecurity leader boosts advanced attack protection to safeguard how people work today across personal/corporate email, social media, and cloud applications.

Read More
Knowledge-driven cyber risk insights improved

Innovative new capabilities enable organizations to establish holistic visibility into cyber risk...

Read More
Huawei and Ivanti sign cooperation agreement

Huawei has signed a Memorandum of Understanding (MoU) with Ivanti, the company that unifies IT...

Read More
NetApp bolsters its Solutions Engineering leadership

NetApp has elevated its Solutions Engineering team by appointing Martin Cooper Senior Director...

Read More
DXC and AWS collaborate

Companies to deliver agile, end-to-end cloud migration solutions that couple the power of the...

Read More
Allot, McAfee and Telefonica join forces

Integrated solution protects the SMBs' fixed and mobile networks, mobile devices and PCs.

Read More
NEWS
86% of websites at risk from hackers for simple security oversight

Security scans performed on 218,000 Magento websites, the most popular e-commerce platform,...

Read More
NEWS
Intel innovates for the 'data-centric' era

Intel has shared its strategy for the future of data-centric computing, as well as an expansive...

Read More
NEWS
Security hygiene in the spotlight

More than 60 percent of organisations not leveraging established hardening benchmarks.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

Expert Opinions

By Gordon Johnson, Senior CFD Manager, Subzero Engineering.
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...
By Eric Herzog, Chief Marketing Officer at Infinidat.