NEWS
Open source breaches increase 71%

Largest ever DevSecOps survey shows 41% of executives not implementing open source governance in their companies.

Read More
NEWS
Tripwire debuts penetration testing and industrial cybersecurity assessment services

New service offerings reinforce critical security controls, assess security weaknesses of enterprises and industrial organizations.

Read More
NEWS
Simplifying continuous discovery and protection in the Cloud

CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and...

Read More
NEWS
Fifty percent increase in Botnet stolen credentials

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019 Annual Cyberthreat Landscape Report providing insights into emerging and evolving cybersecurity trends. The report reveals that botnet stolen credentials increased by a staggering fifty percent in...

Read More
NEWS
IoT devices under constant attack

Cyxtera Technologies has released findings from an extensive research project, the “Detection of...

Read More
NEWS
Verizon refocuses the cyber investigations spotlight on the world of Insider Threats

The Verizon Data Breach Investigations Report (DBIR) series opened the doors to the world of...

Read More
NEWS
Only 15 percent of UK enterprises confident in their ability to defend themselves

Inability to detect threats, alongside stretched budgets and talent shortage hampering large...

Read More
NEWS
Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation...

Read More
NEWS
Exabeam introduces Cloud-based SIEM

Deployment flexibility and transferable user-based pricing model allows security teams to easily...

Read More
NEWS
Trustwave expands Managed Security Services Alliance with Palo Alto Networks

Trustwave has expanded its alliance with Palo Alto Networks for delivering managed security...

Read More
NEWS
Vectra launches Cognito Stream

Delivers enterprise-scale network metadata to data lakes without the complexity, constant tuning...

Read More
NEWS
Unified access management can drive dynamic marketplaces

OneLogin has released a study that found the workforce, workplace, and the technologies that...

Read More
NEWS
Cybercriminals earning over $3B annually exploiting social platforms

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining...

Read More
NEWS
Attack on critical national infrastructure is imminent

Convergence between physical and cyber environments is leaving businesses exposed.

Read More
NEWS
Three-quarters of cybersecurity professionals still concerned about bot traffic

Seventy-five percent of organisations have expressed concerns about bot traffic (bot robots and...

Read More

Videos

Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, discusses the current business continuity and disaster recovery landscape.

Expert Opinions

By Kyle Hauptfleisch, Chief Growth Officer, Daemon.
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...