Cross-Cloud visibility and data protection

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance controls and encryption across a wide range of applications through cloud APIs.

Read More
Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks.

Read More
Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications, products and cloud services with Gemalto's industry-leading authentication, encryption and key management solutions.

Read More
Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security appliance that combines intelligent packet capture with long-term storage, allowing organizations to accelerate breach incident response and resolution.

Read More
ServiceNow reinvents security response

ServiceNow is extending its industry-leading automation and orchestration expertise to transform...

Read More
Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks...

Read More
Insurance a critical component of cyber defence strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to...

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More
50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data...

Read More
17 per cent of IT managers admit to hacking

Absolute® Software has published the results of a research report the company conducted among...

Read More
Tripwire debuts Online Security Application Exchange Platform

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More
Nexsan adds Web browser access

Nexsan says that its family of Transporter private cloud file sync and share...

Read More

Videos

In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...
In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...

Expert Opinions

By Christopher Butler, President, Embedded and Critical Power.
By Errol Bull, P.E., CSI, Application Development Leader at Momentive Performance Materials Inc. Member: IIBEC, ASTM C24, ISO TC59/SC8.
By David Spillane, Systems Engineering Director, Fortinet.