Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration capabilities through the VMware NSX™ network virtualization platform to provide security managers with a unified security policy experience with central management and automation. Through these...

Read More
How to ensure your site is secure

By Liam Enticknap, Network Solutions Architect, Peer 1 Hosting.

Read More
Dell unveils ‘powerful new solutions’ at Vmworld

Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...

Read More
Focus is on software security design flaws

Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...

Read More
HyTrust partners with Intel

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...

Read More
VMware unveils vCloud Air Mobile and Hybrid Cloud Services

Continuing the rapid expansion of its VMware vCloud® Air™ hybrid cloud platform, VMware,...

Read More
‘Comprehensive’ protection for the hybrid data centre

McAfee, part of Intel Security, has announced key advancements to its Server Security Suites...

Read More
VMware delivers innovations for the open, agile, secure software-defined data centre

VMware, Inc. has announced new virtualization, cloud management and integrated OpenStack solutions...

Read More
Is £266bn just the tip of the Cybercrime iceberg?

By Mark Sparshott, EMEA Director at Proofpoint.

Read More
Tripwire survey examines views of information security professionals at annual IT security conference

Tripwire, Inc. has announced the results of a survey of 215 attendees at the Black Hat USA 2014...

Read More
Data breaches prompt UK businesses to re-think data protection strategy

Trend Micro research finds majority of organisations lack customer notification processes required...

Read More
UK workforce is ‘doing IT’ for themselves

IT leaders see the value of end user computing strategies but risk and compliance issues prohibit...

Read More

Videos

Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
Ed Bissell, Sales & Marketing Director, Stellium Datacenters, discusses an Open Compute Project (OCP) Proof of Concept at its HPC hyperscale data centre near Newcastle. This follows the integration phase of an...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...

Expert Opinions

Harnessing waste heat to reduce operating costs and improve sustainability.
By Victoria Boryaeva - Senior Director of Marketing and Business Development at Pulseway