Advanced WAF For Multi-Cloud app security

New offering delivers unmatched protection for all apps, with flexible consumption models to fit any deployment and management scenario.

Read More
Cryptomining malware that works outside the web browser on the rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that can operate without an active web browser session.

Read More
Cloud Computing is top transformative technology

The SolarWinds IT Trends Report 2018 reveals containers are a top investment priority today over technology like artificial intelligence.

Read More
Symantec and NTT Security plan strategic partnership

Collaboration aims to strengthen cyber security initiatives as the foundation for digital transformation.

Read More
NEWS
GDPR concern still high

One in three global businesses believe that the impact of GDPR could threaten their...

Read More
Neustar introduces NetProtect: a direct connect Distributed Denial of Service Defence Solution

Robust alternative to GRE or VPN tunnels provides a more secure connection for transferring data.

Read More
Certificate mistrust

Venafi has published the results of a study conducted by Dimensional Research that evaluates...

Read More
intY partners to capitalise on integrated backup and disaster recovery solution

Hybrid cloud data protection vendor, Acronis, says that global cloud distributor, intY, will...

Read More
NEWS
Worldwide Public Cloud revenue to grow 21.4 per cent

The worldwide public cloud services market is projected to grow 21.4 per cent in 2018 to total...

Read More
NEWS
Landmark Information Group relies on Veeam

Landmark, which delivers critical environmental and property risk information to UK entities, has...

Read More
NEWS
97% of organizations are unprepared for Gen V cyber-attacks

Enterprises face an average 56 cyber-attacks per year;  those that secure networks in...

Read More
Zerto expands executive leadership team

A new position to build on the company’s high-growth partner and customer strategy.

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

By Haris Pylarinos, Founder and CEO of Hack The Box
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications