NEWS
How mass remote work has changed DDoS

It’s hard to imagine a time when Internet connectivity was such an important commodity in our everyday lives. In the pre-pandemic world we relied on it, but the act of national lockdowns, global travel restrictions and quarantine orders pushed us to lean ever more heavily on that...

Read More
NEWS
Navigating shark-infested waters

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More
NEWS
A question of priorities

Where should cloud-centric organisations focus data protection? By Anurag Kahol, CTO, Bitglass.

Read More
NEWS
Misconceptions around cloud-native security

The most crucial part of any cloud native journey is learning about cloud native security early on in the process. By Rani Osnat, VP Strategy at Aqua Security.

Read More
NEWS
Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten...

Read More
NEWS
How Zero trust security makes the everywhere workplace possible

Zero trust security clearly offers the most efficient and cost-effective way to secure the...

Read More
NEWS
Why openness means better cyber security

The Open XDR movement is gaining traction. By Brian Foster, Vice President of Product Management...

Read More
NEWS
How to develop and maintain an effective DevSecOps culture

Every increment in understanding and collaboration around the stack, delivery, governance and...

Read More
NEWS
A three-pronged approach to government security

The increase of ransomware attacks over recent years has cast a spotlight on the need for...

Read More
NEWS
How QKD is combatting the increased sophistication of today’s cyber-attacks?

As global economises digitalise at speed, our collective success depends on the trust of secure and...

Read More
NEWS
Authentication best practice within a Zero Trust strategy

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust....

Read More
NEWS
Navigating the SASE Maze

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager,...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

News

Sophos introduces Workspace Protection, providing security for hybrid work environments and managing users and data across different platforms.
CoreView releases Tenant Resilience and Management to strengthen security and governance of Microsoft 365 tenants.
Deutsche Telekom Security leverages Akamai's Security Certified Service Provider initiative to enhance cybersecurity solutions across key sectors.
Discover how Spence Software slashed IT costs and enhanced system performance with 11:11's managed infrastructure.