InAuth unveils next generation of fraud fighting tools

InAuth has enhanced its InExchange® solution, a global digital intelligence network, to provide businesses with advanced insights to help them make smarter security decisions.

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise.

Read More
Voyager Solutions partners with UiPath

UiPath’s RPA solution to help Voyager Solutions customers complete core operations more efficiently, accurately, securely and at scale.

Read More
NEWS
Half of businesses ignore future cyber threats

More than half of businesses (51 per cent) are focused on today’s cyber threats at the expense of tomorrow’s, according to new research from Accenture. Chief Information Security Officers are also under pressure, with half of them saying their responsibilities are growing faster than they...

Read More
Building risk awareness and aligning with business strategy are top priorities

MetricStream’s latest survey on the state of internal audit finds auditors focused on...

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...

Read More
Veeam delivers hyper-availability for Nutanix AHV

New joint solution provides businesses with simplified IT operational management, lower costs and...

Read More
SolarWinds acquires Trusted Metrics

SolarWinds has acquired Trusted Metrics, a provider of real-time threat monitoring and management...

Read More
Fujitsu enables Blockchain proof of business in just a week

Fujitsu launches new, extremely rapid blockchain productisation framework for customers seeking...

Read More
New Aeriandi survey reveals voice is the silent cyber security threat

72 percent believe advances in voice technology pose a significant threat to enterprise...

Read More
Fujitsu simplifies disaster recovery

Fujitsu has introduced the latest version of Fujitsu ETERNUS Snapshot Manager (ESM). This...

Read More
NEWS
SonicWall raises alarm on encrypted threats and chip-based attacks

Company publishes mid-year update of 2018 SonicWall Cyber Threat Report, finds more than 5.99...

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, outlines the importance of service productisation and MSP enablement.
In this video, we talk to RiT Tech at the DCA's 10x10 2025

Expert Opinions

By Stig Martin Fiska, Global Head of Cognizant Ocean.
Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Brenton O'Callaghan, Chief Product Officer, Avantra.
By Chris Wellfair, Projects Director, Secure I.T. Environments.