DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Bit9 and Carbon Black merge

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...

Read More
Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...

Read More
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...

Read More
Security concerns holding back data centre consolidation and Cloud migration

Security concerns are preventing businesses from unlocking the potential benefits of data centre...

Read More
Driven by end-user digital demand, Capgemini consolidates digital expertise in new global service line

Consolidation of three year industry research program with MIT Center for Digital Business and...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More

Videos

Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Patrick Aronson, Chief Marketing Officer and APAC Executive Vice President at Westcon-Comstor, looks at the challenges and opportunities for MSPs and other channel partners around data, as outlined in the...
Ian Kilpatrick, former EVP of Nuvias and the driving force behind the newly established Tech Channel Ambassadors, explains the thinking behind the organisation – a new Community Interest Company (CIC)...

Expert Opinions

By Michael Lukaszcyk, CEO and co-founder, Hygraph.
By Michael Skurla, Chief Product Officer, Radix IoT.
By Carl Peters, European VP Solutions Engineering at Zayo Group.
By Ian Ray, Head of Data, AI and ML, Daemon.