35 percent of websites are putting users at risk

With January deadline for SHA-2 migration just 45 days away, many websites could face major disruptions in the New Year.

Read More
CyberArk adds credential theft blocking

CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting credential theft at the endpoint. CyberArk Viewfinity, with enhanced threat protection features, is now available as CyberArk Endpoint Privilege Manager.

Read More
BringinghHigh availability security to mobile business networks

Setting the gold standard for business continuity through innovative dynamic licence pooling to...

Read More
Wipro and ASG Technologies partner

Wipro and ASG Technologies have expanded their partnership that integrates the offerings of...

Read More
NEWS
Predicting a secure future?

The digital and the physical merge to create a tangled terrain.

Read More
Gemalto advances secure communications for financial services industry

Gemalto SafeNet HSM delivers highest level of digital trust to secure sensitive communications...

Read More
SailPoint names Kevin Hansel chief information officer

Identity governance leader appoints industry veteran to drive IT innovation and scale in...

Read More
Capability will determine which cloud providers thrive under the GDPR

All parties will be signing up to the GDPR so everyone must demonstrate compliance.

Read More
Report illustrates value of intelligent security management

Industry-first study quantifies security management impact on security-related risks and...

Read More
What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...

Read More
Preparing for privacy

With indicators suggesting that organisations face much work ahead, AvePoint and CIPL partner to...

Read More
Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More

Videos

Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...

Expert Opinions

Pulsant’s Natasha O’Brien explains why a resilient and sovereign digital infrastructure could represent the answer to escalating insurance costs.
By Matt Sherwen, Managing Director of Sherwen Studios.