LogRhythm 7.2 boosts effectiveness and efficiency of enterprise SOCs

More powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale extend differentiation for company’s threat lifecycle management solution.

Read More
ForgeRock and Pivotal team up

New collaboration broadens identity relationship management options for organizations on the Pivotal cloud-native platform, facilitating and accelerating their digital transformation.

Read More
35 percent of websites are putting users at risk

With January deadline for SHA-2 migration just 45 days away, many websites could face major disruptions in the New Year.

Read More
CyberArk adds credential theft blocking

CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting...

Read More
NEWS
Organisations remain unprepared to respond to cyberattacks

Two-year study shows decline in Cyber Resilience in 2016.

Read More
BringinghHigh availability security to mobile business networks

Setting the gold standard for business continuity through innovative dynamic licence pooling to...

Read More
Wipro and ASG Technologies partner

Wipro and ASG Technologies have expanded their partnership that integrates the offerings of...

Read More
NEWS
Predicting a secure future?

The digital and the physical merge to create a tangled terrain.

Read More
Gemalto advances secure communications for financial services industry

Gemalto SafeNet HSM delivers highest level of digital trust to secure sensitive communications...

Read More
SailPoint names Kevin Hansel chief information officer

Identity governance leader appoints industry veteran to drive IT innovation and scale in...

Read More
Capability will determine which cloud providers thrive under the GDPR

All parties will be signing up to the GDPR so everyone must demonstrate compliance.

Read More
Report illustrates value of intelligent security management

Industry-first study quantifies security management impact on security-related risks and...

Read More
What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, covers cybersecurity threats and risk mitigation.
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...

Expert Opinions

By Tim Popovich, COO, Climb Channel Solutions.
By Kaspar Korjus, CEO and co-founder at Pactum.
By Simon West, General Manager, Network Group.
By Kirsty Paine, Field CTO & Strategic Advisor, Splunk.