Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of privileged accounts.

Read More
GDPR confusion

Businesses more concerned with security costs than meeting ‘State of the Art’ requirement.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises and service providers with the ability to simplify the consumption of app services. The A10 FlexPool aggregated capacity model allows customers to flexibly allocate and re-distribute capacity...

Read More
Ransomware to rule

Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased in 2017.

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
Riverbed and Zscaler deliver unified Cloud networking and security solution

Seamless integration of Riverbed SteelConnect SD-WAN and Zscaler cloud security platform...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More
NEWS
Global CISOs concerned about cybersecurity readiness

Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...

Read More
NEWS
Dark web dangers

Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...

Read More
Security challenges delay enterprise migrations to the Cloud

Enterprises embracing hybrid cloud, but need better visibility and security management processes to...

Read More
NEWS
Reducing the risk of data breaches

Centrify encourages businesses to increase their Identity and Access Management maturity to...

Read More
Cyber security start-up aims to simplify cyber security for SMEs

A tech start-up is aiming to simplify cyber security with the launch of its new automated software...

Read More
Survey confirms that consumers lack confidence in IoT device security

Businesses and consumers support government-mandated IoT security regulations.

Read More
Synchronised app control

First firewall to offer complete identification of unknown application traffic by using information...

Read More

Videos

Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Scott Constable, Alliance Director at Vespertec, John Griffith, Worldwide Sales Manager at Midas Immersion Cooling and Dr. George Zhang, Vice President of R&D at Valvoline Global, discuss the three...

Expert Opinions

By James Preston, Principal Security Consultant at ANSecurity.
By Martin Schirmer, Group Vice President of NEMEA, Cloudera.
By Floyd Christofferson, Vice President of Product Marketing, Hammerspace.
By Patrycja Sobera, Senior Vice President and General Manager, Digital Workplace Solutions, Unisys.