NEWS
Nine in 10 cybersecurity leaders fear risk of third-party attacks

Half of professionals also admitted concerns around their current cloud providers.

Read More
NEWS
Pulse Secure helps Hogarth Worldwide to improve secure access with Zero Trust approach

Hogarth selected Pulse Secure’s VPN and NAC solutions to ensure workforce is authenticated, authorised and secure.

Read More
NEWS
More than half of UK businesses are still not fully GDPR compliant

Findings reveal that 37% of respondents have reported an incident to the ICO in the past 12 months, with double the amount being reported from mid-sized organisations versus larger enterprises.

Read More
NEWS
Security breaches hit SMBs

Nearly one-third (32%) of IT group employees in SMBs and mid-market enterprises globally said their organisation had experienced a security breach in the past five years, with at least 10% of the total sample of respondents reporting that they were hit by a breach in the past year. That’s...

Read More
NEWS
265% growth in fileless events

Threats in 2019 bring the ultimate test of defenses by evading traditional security.

Read More
NEWS
Cyberattacks need human clicks

Threat actors continue to use socially-engineered attacks across email, cloud applications, and...

Read More
NEWS
Strengthening the enforcement of zero trust

New Privileged Access Analytics drives visibility into privileged entities and detects malicious...

Read More
NEWS
CISOs now think cloud is safer than on-premise, but security fears remain

Nominet has published its Cyber Security and the Cloud research, finding that 61 percent of...

Read More
NEWS
ANSecurity strengthens New College Oxford’s network security with move to a Zero Trust model

ANSecurity delivers 6 week project to refresh college network infrastructure, improve security and...

Read More
NEWS
EMEA identified as global hotspot for brute force access attacks

Research from F5 Labs shows region has highest proportion of brute force attacks.

Read More
NEWS
Cybersecurity - big in the boardroom

Two-thirds of enterprises are s.truggling to embed security in the enterprise-IT architecture

Read More
NEWS
Proofpoint expands Okta partnership

Cybersecurity leader and enterprise identity leader bolster the security posture for...

Read More
NEWS
Security and privacy - competitive advantages?

Ping Identity has published two new white papers from its CISO Advisory Council on securing...

Read More
NEWS
Exabeam expands SIEM availability

With Exabeam SaaS Cloud, security teams across Canada, Europe, Asia-Pacific and South America can...

Read More
NEWS
10 methods to mitigate IoT security threats

​​Cyber Security Services, an emerging cyber security consulting company, has released its top...

Read More

Videos

Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...

Expert Opinions

By Kiva Kolstein, President and Chief Revenue Officer at AlphaSense.
By Kyle Hauptfleisch, Chief Growth Officer, Daemon.
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...
By Simon West, General Manager, Network Group.