How leaky is your device?

A new generation of digital devices that will protect consumers from cyber-attacks could be a step closer thanks to a grant of over ?1 million from the Engineering and Physical Sciences Research Council (EPSRC) awarded to the University of Bristol for a research project to protect...

Read More
Beware wearables

 Ipswitch's  2015 Wearable Technology Survey  reveals concerns about wearable technology in the workplace.

Read More
NTT Com Security adds machine learning detection capabilities

NTT Com Security, in collaboration with NTT Communications, has  added machine learning capabilities to its Managed Security Services (MSS) solution under the WideAngle brand. The new move forms part of the global information security and risk management...

Read More
Public networks used for corporate access

Bromium®, Inc. has published the results of “CTIA Super Mobility – Understanding Mobility and Risk,” a survey of mobile users who attended the CTIA Super Mobility 2015 conference, focused on public network access patterns. The research reveals that the majority of mobile users access...

Read More
The 'outside' insider threat

61 percent cite privileged account takeover as most difficult cyber attack stage to mitigate; 44...

Read More
Mobility is a critical success driver

Mobility is transforming how enterprises do business, and most organisations expect the burgeoning...

Read More
NEWS
Alert Logic releases 2015 Cloud Security Report

Cyber attackers follow companies into the cloud; research shows 45 percent increase in...

Read More
ECJ deliver damning decision on US data protection

The Court of Justice of the European Union (CJEU) has delivered a damning decision on US data...

Read More
Code42 secures $85 million in funding

Code42 has secured $85 million in Series B funding led by new investors JMI Equity, a growth equity...

Read More
Cybercrime is a 'grave threat' to the economy and law enforcement

Research produced for the City of London Corporation and supported by the City of London Police...

Read More
Nuix promotes international cybersecurity adviser Stuart Clarke to cyber-CTO

Nuix, a company that protects, informs, and empowers society in the knowledge age, today promoted...

Read More
Digital Guardian acquires Code Green Networks

Digital Guardian, the endpoint security platform purpose- built to stop data theft, has...

Read More
Vormetric strengthens EMEA Channel

Ex-Fortinet Global Account Director, Chris Smith, joins encryption leader to drive and grow channel...

Read More
End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first...

Read More
ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will...

Read More

Videos

Ben Pritchard, CEO of AVK, discusses the launch of what is believed to be Europe’s first, large-scale, 110 MW on-site microgrid, developed to support early phase site operational resilience. Located within...
Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
Thiri Shwesin Aung, founder and CEO of Nyxium, discusses how she and co-founder, Paul Seurin, have built an agentic AI platform that helps energy and infrastructure developers decide where projects are most...

Expert Opinions

By Eileen Haggerty, area vice president, product & solutions at NETSCOUT.
In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Frank Warren, SVP, Global Operations, Park Place Technologies.