Proofpoint joins Open Information Security Foundation

Leader in advanced threat protection remains dedicated to supporting open source initiatives following Emerging Threats acquisition.

Read More
CA Technologies strengthens identity-centric security portfolio

CA Technologies has launched new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe.

Read More
Pulse opens online education centre

Training platform empowers customer development, increases time-to-productivity.

Read More
‘Segment of One’ for Cloud and Hybrid environment access control

New AppGate XDP release simplifies access security and ensures that all resources – private...

Read More
NEWS
Global cybersecurity - could do better

International survey of information security professionals identifies cloud, mobile devices and...

Read More
NEWS
Security heads 2016 agenda

Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...

Read More
NEWS
Threat Intelligence identified as 2016 investment priority

Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.

Read More
Achieving compliance objectives

BeyondTrust has introduced the latest version of the company’s privileged password and...

Read More
NEWS
Singapore deploys Gemalto's authentication solution

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides...

Read More
Banking on compliance

Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help...

Read More
Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More

Videos

Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

As data center construction across North America accelerates, projects are becoming larger, faster and more complex than ever before – and the consequences of getting fire safety wrong have never been...
By Adhum Carter Wolde-Lule – Director at Prism Power Group.
By Simon Seymour-Perry, CEO of Logica Security.