Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete Hardware Based Transaction Security Solution. The LiquidSecurity™ HSM family provides a FIPS 140-2 level 2 and 3 partitioned, centralized and elastic key management solution with the highest...

Read More
Imperva teams with IS Group

Agreement strengthens IS Groups’ cloud service offering by providing its over 30,000 customers with industry-leading security and performance solutions.

Read More
Security Intelligence Platform for Sanctioned Cloud Services

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services. The new offering is built on a canonical Cloud API Engine that enables rapid detection and response on a single platform for security, compliance, and data governance across all sanctioned cloud...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More
FireMon adds CTO

New CTO and Marketing VP extend management vision to help fuel future expansion.

Read More
AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat...

Read More
Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for...

Read More
NetIQ launches advanced access and authentication solutions

Enterprises leverage the power of identity to deliver simple user access to sensitive information...

Read More
Nokia and Alcatel-Lucent to combine

Nokia and Alcatel-Lucent intend to combine to create an innovation leader in next generation...

Read More
Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at...

Read More
Akamai Cloud Security Intelligence is the foundation for new services

Recognising the crucial role data analytics play in more effectively fighting cloud security...

Read More
AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000...

Read More
Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship...

Read More

Videos

Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Eric Herzog, Chief Marketing Officer at Infinidat.
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...
By Prasad Sankaran, President, Software and Platform Engineering at Cognizant.
By Steve Leeper, VP of Product Marketing, Datadobi.