NEWS
Multiple attack types are the norm

Verisign has released its Q1 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services, and...

Read More
MobileIron modernises multi-factor authentication for the Cloud

MobileIron Authenticator is the next step toward simple and smart security for modern work.

Read More
The dangers of deskop apps

Flexera has released Vulnerability Review 2018: Top Desktop Apps, part of the annual report series from Secunia Research at Flexera.  This new edition focuses on heavily used desktop applications, which can be easily breached through the Internet.  The report reveals the biggest...

Read More
NEWS
G?ANT selects Flowmon DDoS Defender to help protect 50 million users

40 national research networks and 10,000 educational institutions benefit from critical IT services protected by out-of-path and AI enhanced solution.

Read More
Mobile machine security

Venafi Enterprise Mobility Protect delivers continuous visibility and comprehensive machine...

Read More
Zscaler further expands its partner ecosystem

Zscaler increases partnerships to accelerate network and security transformation for enterprises...

Read More
89% of UK IT chiefs admit they keep legacy apps running on ‘life support’

New study: IT decision makers reveal why they feel forced to keep obsolete systems running just to...

Read More
SailPoint forms board-level cybersecurity committee

To better respond to the increasing cybersecurity challenges facing all companies and to...

Read More
Wedge Networks increases functionality and performance of Malware Prevention Platform

Wedge Networks has introduced Release 2.0 software of the Wedge Advanced Malware Blocker™...

Read More
NEWS
ICO projects contain five security vulnerabilities on average

ICO security company launches Chainwatch, a real time monitoring product for ICOs.

Read More
NEWS
From cloud growth to a cloud mess: two out of three SMBs struggle with over-complicated IT infrastructure

As their businesses grow, companies increasingly embrace new business tools and cloud services...

Read More
BeyondTrust partners with SINEVIS

BeyondTrust and SINEVIS will work to establish Privileged Access Management as the foundational...

Read More
Increasing IT agility

A10 Networks has introduced the A10 Ingress Controller for Kubernetes, and its integration with...

Read More
CompTIA pledges to get the UK Cyber Ready

CompTIA announces government funding for Cyber Ready retraining initiative, giving applicants a...

Read More
Node4 extends partnership with Trend Micro to manage hybrid cloud security

Security across disparate technologies and cloud environments made simpler with dedicated managed...

Read More

Videos

Deborah Garand, Managing Director - High Tech, Accenture, discusses the findings of the company’s recent ‘As a Service, at Your Service’ research report which looks at the challenges and opportunities...
Kenneth Tan, Executive Director at Sardina Systems, Philip Kaye, Co-Founder and Director at Vespertec and Kristófer Andri Kristinsson, Product Manager and Business Development Manager at Borealis Data Center,...
Arvind Parthiban, CEO and Co-founder of SuperOps, discusses the recent launch of Monica, an AI-powered SuperCompanion designed specifically for MSPs. Arvind explains that Monica is ‘not just another’ AI...
Dina Knight, Chief People Officer, Logicalis, is accountable for all aspects of Logicalis’ and parent company, Datatec’s, people operations strategy from the board level down. In her role, Dina ensures...

Expert Opinions

By Richard Eglon, CMO, Nebula Global Services.
Anita Mavridis, VP of Product at Zivver, and Sue Musumeci, Director of Quality & Clinical Informatics at Chronic Care Staffing, explore practical strategies for empowering employees.
By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist – Business and Technology, Trudy Darwin Communications.
With data centres now deemed as critical infrastructure, organisations must evolve beyond traditional security to combat sophisticated cyber threats. By Jon Mort, CTO, The Adaptavist Group,