Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the latest version of the risk assessment software vsRisk™, which is fully compatible with ISO27001:2013. The new version also presents the opportunity to apply it to multiple information security...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and compliance expertise, is launching a range of unique products and services designed to help British organisations implement the newly released Cyber Essentials Scheme Requirements. These include a Cyber...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement, Imperva is addressing the massive security gaps left by increasingly complex IT infrastructures, and is delivering industry leading protection against insider threats.

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
ManageEngine fortifies enterprise security log analytics

New SIEM GA features: real-time event correlation, complete user audit trail, ISO 27001 reporting,...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Software warnt vor Ausfällen unternehmensinterner Anwendungen 

Neues Whitepaper von Paessler: Applikationen und Services mit Netzwerk-Monitoring überwachen

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
Understanding risk from a business perspective is a top security concern

Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...

Read More
Dell secures critical business data and devices

Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
DCW Asia 2025 - Part 3 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Haris Pylarinos, Founder and CEO of Hack The Box
By Chris Ackerson, SVP of Product at AlphaSense.