NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
40 per cent of accounts are hacked by simply guessing user passwords

Kaspersky Lab launches new password manager to help secure passwords.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
Accelerating incident response

CyberArk has introduced advanced insider threat detection capabilities available through the...

Read More
Unifying fraud protection

RSA, a Dell Technologies business, has unveiled a centralized platform that is designed to...

Read More
Reimagining identity strategies

RSA, a Dell Technologies business, has showcased a series of enhancements to its RSA SecurID®...

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Thales addresses enterprise encryption key governance for Microsoft Azure

Key management-as-a-service (KMaaS) meets enterprise needs for direct control of encryption keys.

Read More
CyberArk supports Amazon Inspector

CyberArk has introduced expanded privileged account security solutions for Amazon Web Services...

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More

Videos

Tim Whiteley, Cofounder of Inevidesk, has added three new partners to its channel partner programme, as part of its commitment to bringing the benefits of virtual desktop infrastructure (VDI) to the widest...
Dr Clare Walsh, Director of Education at the Institute of Analytics (IoA), and one of the of the world’s leading academic voices in data analytics and AI, discusses the ways in which AI will (and won’t)...
Kirsty Biddiscombe, AI, ML and Data Analytics lead for NetApp EMEA, discusses the challenges and opportunities of enterprise AI - with the focus very much on the current skills shortage.
Jeff Borrman, CEO, Bioscope Technologies, explains the Bioleaching and Bio-refining processes it is developing at industrial scale for the sustainable recovery of base and precious metals from printed circuit...

Expert Opinions

Nadir Izrael, Co-Founder and CTO at Armis discusses the importance of critical infrastructure adopting new solutions to stay ahead of rising cyber threats.
By Mahesh Desai, Head of EMEA Public Cloud, Rackspace Technology.
By Ramzi Charif, VP Technical Operations, EMEA, VIRTUS Data Centres.
By Andrew Strevens, Chief Integration Officer for the new organisational Hampshire and IOW Healthcare NHS Foundation Trust, previously CEO of Solent NHS Trust.