InAuth unveils next generation of fraud fighting tools

InAuth has enhanced its InExchange® solution, a global digital intelligence network, to provide businesses with advanced insights to help them make smarter security decisions.

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise.

Read More
Voyager Solutions partners with UiPath

UiPath’s RPA solution to help Voyager Solutions customers complete core operations more efficiently, accurately, securely and at scale.

Read More
NEWS
Half of businesses ignore future cyber threats

More than half of businesses (51 per cent) are focused on today’s cyber threats at the expense of tomorrow’s, according to new research from Accenture. Chief Information Security Officers are also under pressure, with half of them saying their responsibilities are growing faster than they...

Read More
Building risk awareness and aligning with business strategy are top priorities

MetricStream’s latest survey on the state of internal audit finds auditors focused on...

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...

Read More
Veeam delivers hyper-availability for Nutanix AHV

New joint solution provides businesses with simplified IT operational management, lower costs and...

Read More
SolarWinds acquires Trusted Metrics

SolarWinds has acquired Trusted Metrics, a provider of real-time threat monitoring and management...

Read More
Fujitsu enables Blockchain proof of business in just a week

Fujitsu launches new, extremely rapid blockchain productisation framework for customers seeking...

Read More
New Aeriandi survey reveals voice is the silent cyber security threat

72 percent believe advances in voice technology pose a significant threat to enterprise...

Read More
Fujitsu simplifies disaster recovery

Fujitsu has introduced the latest version of Fujitsu ETERNUS Snapshot Manager (ESM). This...

Read More
NEWS
SonicWall raises alarm on encrypted threats and chip-based attacks

Company publishes mid-year update of 2018 SonicWall Cyber Threat Report, finds more than 5.99...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
By Haris Pylarinos, Founder and CEO of Hack The Box
By Lorenzo Romano, CEO of GCX Managed Services
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...