Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured from multiple, simultaneous attackers.

Read More
Omada & Balabit partner

Omada and Balabit each provide unique innovative solutions within IT Security and Compliance.  The two companies have entered a partnership to provide additional value to their customers through complementary IT security solutions.

Read More
Tenable Network Security raises $250 million

Series B funding led by Insight Venture Partners and Accel will help accelerate development of the...

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
NEWS
Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated...

Read More
NEWS
Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member...

Read More
The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key...

Read More
87% of IT professionals disagree with UK governments’ efforts to limit encryption

Tech community reacts to the government’s new Investigatory Powers Bill, which bans the use of...

Read More

Videos

Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Ofir Bloch, VP at WalkMe, discusses the results of WalkMe’s fifth annual State of Digital Adoption report, which reveals that over half (54%) of workers bypassed AI tools and completed tasks manually at...
Matt Wilkins, Global Director of Design and Engineering at Colt DCS, explains that data centre operators need ‘controlled flexibility’ now more than ever, as tightened regulatory environments, skills gaps,...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...

Expert Opinions

By Alexandra Thorer, Chief Growth Officer at BCS Consultancy.
In data centres, direct-to-chip liquid cooling relies on fast-acting valves to regulate coolant flow and protect servers from overheating. Yet across server racks operating 24/7, the cumulative energy demand...
By Inna Weiner, VP of Product, Data & AI, AppsFlyer.