Survey finds most companies are not ready for GDPR

A fifth of companies lack continuous encryption for personally identifiable information, and only half have the systems required to meet Articles 16 and 17 of the GDPR legislation.

Read More
Micro Focus delivers distributed correlation solution

ArcSight Enterprise Security Manager (ESM) 7.0 enables Security Operations Centres (SOCs) to become agile, expand their cyber security footprint and respond quickly to evolving threats at massive scale – up to 100,000 correlated events per second, per cluster.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Thunder defeats cyber attacks

A10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder TPS (Threat Protection System) with A10’s Non-stop DNS solution across multiple data centres to ensure resilience from escalating cyber-attacks and scale its mission critical DNS services.

Read More
Security orchestration across major Cloud platforms

As they struggle to deal with the speed of business process automation and the exponential...

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
A10 Networks introduces One-DDoS Protection

A10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...

Read More
Legacy email systems - a significant security risk?

Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...

Read More
Tripwire expands Cloud Security capabilities

New functionality tackles publicly exposed cloud data; core secure configuration functionality now...

Read More
Helping to validate Microsoft Azure DDoS Protection Service defences

BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, shares his future predictions about enterprise storage that CTOs should take into consideration and also advises as to what enterprises should be thinking...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...

Expert Opinions

By David Trossell, CEO and CTO of Bridgeworks.
By Jean-Marc Bourreau, Co-founder, Afrik Foundation.
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By Frank Jones, CEO, IMS Evolve.