Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications, products and cloud services with Gemalto's industry-leading authentication, encryption and key management solutions.

Read More
Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks.

Read More
Harrowells Solicitors selects SMS PASSCODE to secure remote working

Harrowells Solicitors, the Yorkshire-based law firm, is working with Danish authentication company SMS PASSCODE, to secure its remote access to the company’s network and applications.

Read More
Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security appliance that combines intelligent packet capture with long-term storage, allowing organizations to accelerate breach incident response and resolution.

Read More
ServiceNow reinvents security response

ServiceNow is extending its industry-leading automation and orchestration expertise to transform...

Read More
85% of enterprises keeping sensitive data in the Cloud

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More
Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks...

Read More
Insurance a critical component of cyber defence strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to...

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data...

Read More
50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
prpl Foundation demonstrates security by separation for IoT and other connected embedded devices

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal...

Read More
Tools4ever introduces IDaaS Cloud solution: HelloID

HelloID combined with Tools4ever’s E-SSOM offers 100 percent single single-on.

Read More

Videos

Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...
In this interview, Jack Cooke, Senior Director of Global Partner Programs at Inforcer, discusses how MSPs are evolving in response to AI, security and the growing complexity of the Microsoft ecosystem. He...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...
Ofir Bloch, VP at WalkMe, discusses the results of WalkMe’s fifth annual State of Digital Adoption report, which reveals that over half (54%) of workers bypassed AI tools and completed tasks manually at...

Expert Opinions

By Richard Clifford, VP of sales & Solutions EMEA Salute.
DXC OASIS is an intelligent orchestration platform that integrates seamlessly across existing IT environments, connecting and actively managing organisations’ entire IT estates in real time.
By Michelle Brophy, Director of Research, Tech, Media & Telecom at AlphaSense.