Veracode partners with Imperva

Technology integration simplifies compliance and enables faster vulnerability mitigation, preventing data breaches.

Read More
Unzufriedene Kunden durch ineffizientes Papiermanagement

Einer Iron Mountain-Studie zufolge verlieren Unternehmen ihre Kunden, weil sie ihr Papier nicht in...

Read More
Three-quarters of consumers say organizations don’t care about protecting their data

Most consumers just don’t believe that the personal and financial data they submit to...

Read More
ISACA guidance on managing vendors using COBIT 5

Guide provides sample SLAs, case studies and mappings.

Read More
Total and Databarracks to provide cloud services in new partnership

With over 25 years of experience between them, service providers Total Ltd and Databarracks are...

Read More
LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die...

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
Check Point collaborates with VMware

Check Point automates network security for VMware virtualization and cloud environments.

Read More
Steria survey reveals that overconfidence threatens the security of UK's enterprises

Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a...

Read More
Sophos delivers Advanced Threat Protection for the small and mid-market

Sophos has announced an extensive update to its award winning Unified Threat Management solution,...

Read More
Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected...

Read More
Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking...

Read More

Videos

Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

By Haris Pylarinos, Founder and CEO of Hack The Box
By Manvinder Singh, VP of Product Management for AI at Redis.
By CEO of Global Commissioning, Louis Charlton