NEWS
Kameleon Security and Xilinx collaborate

New joint solution is among first products to be compliant with recently released Open Compute Project security standards; Samples available in 2021.

Read More
NEWS
Security platform includes autonomous threat prevention

New R81 platform automates labor-intensive security administration and management, also reducing policy installation time by up to 90% across the entire distributed enterprise.

Read More
NEWS
AI-powered service seeks to remove excessive cloud permissions

CyberArk has introduced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, artificial intelligence-powered service designed to strengthen the security of cloud environments. Through continuous monitoring of cloud access, CyberArk enforces least privilege by identifying and...

Read More
NEWS
Bring your own danger?

New data reveals organisations do not have sufficient visibility into the devices used by employees.

Read More
NEWS
McAfee sees Covid-19 and PowerShell threats proliferate

McAfee has released its McAfee Labs Threats Report: November 2020, examining cybercriminal activity...

Read More
NEWS
Smart access control is the future

2N, the global intercoms leader, forecasts that COVID-19 and security concerns will lead to...

Read More
NEWS
Westcon signs distribution agreement with AttackIQ

The agreement will cover distribution in the EMEA and APAC regions.

Read More
NEWS
Ping Identity to acquire Symphonic Software

Ping Identity Holding has acquired Symphonic Software, a leader in dynamic authorization for...

Read More
NEWS
Integrated architecture secures cloud native application ecosystem

McAfee MVISION Cloud Native Application Protection Platform delivers comprehensive data protection,...

Read More
NEWS
Cyber security has to be a C-Level priority

The importance of an integrated IT security strategy is steadily increasing, especially in current...

Read More
NEWS
Remote operations lack remote access security

The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital...

Read More
NEWS
Thales launches Identity Verification Suite

Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...

Read More
NEWS
Half of application security flaws remain open six months after discovery

SOSS Volume 11 finds 76% of applications have at least one security flaw.

Read More
NEWS
Employee education singled out as the biggest cybersecurity weakness during lockdown

Thirty per cent of respondents admit to using unencrypted devices according to latest Apricorn poll.

Read More
NEWS
Zero trust momentum continues

Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of...

Read More

Videos

Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

By Jake Madders, Director and Co-Founder, Hyve Managed Hosting.
Pulsant’s Natasha O’Brien explains why a resilient and sovereign digital infrastructure could represent the answer to escalating insurance costs.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.