Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide...

Read More
Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...

Read More
Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web...

Read More
77 percent of executives ‘confident’ in basic security controls

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...

Read More
SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More
Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More
Zycko and ObserveIT announce distribution partnership

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...

Read More
IT leaders taking wrong approach to accommodate shadow IT, says Talon Storage

Shadow IT threatens enterprise security as CIOs turn a blind eye.

Read More
Data breaches “inevitable” and regular changes to cybersecurity measures essential

Nuix, a technology company that enables people to make fact-based decisions from unstructured data,...

Read More
Alert Logic introduces fully managed suite of Cloud security products

Alert Logic, the leading provider of Security-as-a-Service for the cloud, today announced...

Read More
Over 70% of office workers don’t know who to report to regarding a security breach

Research conducted for the launch of UserLock 8 has found that fewer than a third of desk-based...

Read More
Remote working puts data at risk

One in four employees interviewed admit breaking security policies to work remotely and the vast...

Read More

Videos

Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...
Andreas Keiger, Chief Revenue Officer at ZutaCore, discusses the AI power density challenge facing data centre owners and operators, looking at the various liquid cooling options available to address the...

Expert Opinions

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.