Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide...

Read More
Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more employees rely on their mobile devices for both personal and professional activities, the risk of mobile malware and unsafe applications presents challenges for organisations. A recent Harris survey...

Read More
Hunt for attacks in real-time

See what attacks are hiding in your network traffic with our Cloud or on-premise assessments.

Read More
Fujitsu and Shelter celebrate two year partnership

Innovative charity collaboration sees Fujitsu offer practical support to help the charity achieve...

Read More
Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...

Read More
Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web...

Read More
77 percent of executives ‘confident’ in basic security controls

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...

Read More
Painful compliance audits ahead

Frightening lack of awareness of the European Commission’s draft bill that unifies and...

Read More
SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More
Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More
CA Technologies CEO challenges business and technology leaders to build new capabilities

CEO Mike Gregoire kicked off CA World ’14 with a keynote address to thousands of customers...

Read More
Zycko and ObserveIT announce distribution partnership

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...

Read More
IT leaders taking wrong approach to accommodate shadow IT, says Talon Storage

Shadow IT threatens enterprise security as CIOs turn a blind eye.

Read More

Videos

Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
Denis Schertenleib, Nexthink’s Senior Director of Product, believes that the IT service desk won’t survive the next five years and that agentic AI will be the future of IT support. He also discusses...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...

Expert Opinions

By David Spillane, Systems Engineering Director, Fortinet.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
By Arik Diamant, Principal Solution Architect, at Claroty.