Blue Coat launches Encrypted Traffic Management Ready Certification Program

ETM Ready will generate best-in-class solutions for combating security threats hidden in encrypted traffic.

Read More
Overcoming the mobile password 'pain point'

True Key solves the problem of remembering multiple passwords and gives users greater control of their online identities .

Read More
NEWS
Engage digitally, or die!

Organisations that don’t embrace digital customer engagement channels – that’s web chat, social media, SMS, smart phones and mobile applications, and even video - into their engagement strategies within the next two years, are likely to see their customers jump ship to competitors...

Read More
Resilient Systems expands in EMEA

Senior hires, including Paul Ayers as General Manager EMEA, and opening of a European HQ will...

Read More
BMC and Qualys join forces to improve enterprise security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify...

Read More
Security integrated into RTOS

Kaspersky Lab and SYSGO have showcased a security solution for safety-critical tasks which embeds...

Read More
Fortinet FortiSandbox catches Zero-Day and Advanced Threats

Fortinet has launched FortiSandbox 2.0, delivering enhanced features to their top-rated...

Read More
NEWS
Tenable unveils Nessus Cloud

Tenable launches Nessus Cloud to deliver world-class vulnerability management capabilities for SaaS...

Read More
NEWS
McAfee Labs finds mobile apps left vulnerable for months

Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...

Read More
NEWS
Enterprise IT is losing control over business data

Survey of IT decision makers collectively managing more than 250,000 users finds that as the...

Read More
NEWS
Five key IT security trends for 2015

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks...

Read More
NEWS
Security fears stop firms using cloud computing services

New research from the Federation of Small Businesses (FSB) has found that despite three fifths...

Read More
 Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity...

Read More
Check Point acquires Hyperwise

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...

Read More

Videos

Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Welcome to the WinStar Introductory Presentation!
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...

Expert Opinions

By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Graham Jarvis, Freelance Business and Technology Journalist.