InAuth unveils next generation of fraud fighting tools

InAuth has enhanced its InExchange® solution, a global digital intelligence network, to provide businesses with advanced insights to help them make smarter security decisions.

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise.

Read More
Voyager Solutions partners with UiPath

UiPath’s RPA solution to help Voyager Solutions customers complete core operations more efficiently, accurately, securely and at scale.

Read More
NEWS
Half of businesses ignore future cyber threats

More than half of businesses (51 per cent) are focused on today’s cyber threats at the expense of tomorrow’s, according to new research from Accenture. Chief Information Security Officers are also under pressure, with half of them saying their responsibilities are growing faster than they...

Read More
Building risk awareness and aligning with business strategy are top priorities

MetricStream’s latest survey on the state of internal audit finds auditors focused on...

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...

Read More
Veeam delivers hyper-availability for Nutanix AHV

New joint solution provides businesses with simplified IT operational management, lower costs and...

Read More
SolarWinds acquires Trusted Metrics

SolarWinds has acquired Trusted Metrics, a provider of real-time threat monitoring and management...

Read More
Fujitsu enables Blockchain proof of business in just a week

Fujitsu launches new, extremely rapid blockchain productisation framework for customers seeking...

Read More
New Aeriandi survey reveals voice is the silent cyber security threat

72 percent believe advances in voice technology pose a significant threat to enterprise...

Read More
Fujitsu simplifies disaster recovery

Fujitsu has introduced the latest version of Fujitsu ETERNUS Snapshot Manager (ESM). This...

Read More
NEWS
SonicWall raises alarm on encrypted threats and chip-based attacks

Company publishes mid-year update of 2018 SonicWall Cyber Threat Report, finds more than 5.99...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

By Gordon Johnson, Senior CFD Manager, Subzero Engineering.
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Cindy Ryborz, Marketing Manager EMEA, Corning Optical Communications.
By Jon Healy, Regional Strategic Operations Officer at Salute.