Red Hat introduces Application Platform and Linux Container offerings

OpenShift Enterprise 3.1 and Red Hat Atomic Enterprise Platform provide a comprehensive, modular solution for developing, delivering and managing container-based applications across the open hybrid cloud.

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More
Caringo is HPE Helion ready

Caringo's Caringo Swarm software-defined object software is now fully tested and supported for Hewlett Packard Enterprise (HPE) Helion OpenStack® as part of the HPE Helion Ready Program for Solution Providers.

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More
NEWS
Alliance to drive IoT interoperability

With an estimated 25 billion connected things in the Internet of Things (IoT), and with...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Mangstor extends its global reach to Europe with distribution deal

Diamond Point International appointed as first European distributor to deliver breakthrough all...

Read More
Cloudian and Rausch Netzwerktechnik form partnership

Meeting growing demand for scale-out Object Storage in the German market.

Read More
NEWS
Cannon heard in Tasmania

Cannon Technologies, has been commissioned to commence a brand new project for Perth-based Red...

Read More
Zayo to acquire Viatel

Acquisition to cement Zayo as a leading Pan-European infrastructure provider.

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Ceasar Anquillare, Chairman & CEO, Winchester Capital, Nora L. Neergaard, Managing Director Europe & Co-Founder of WinStar and Dr David Bowen, Managing Director and Co-Founder of WinStar provide some...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...

Expert Opinions

By Giedrius Steimantas, Engineering Manager, Oxylabs
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By Richard Mitchell, Head of Channel, ThreatAware