NEWS
Ping Identity to acquire Symphonic Software

Ping Identity Holding has acquired Symphonic Software, a leader in dynamic authorization for protecting APIs, data, apps and resources through identity. Dynamic authorization gives IT teams ultimate flexibility to control what users can see and do, enabling enterprises to more easily prevent...

Read More
NEWS
Integrated architecture secures cloud native application ecosystem

McAfee MVISION Cloud Native Application Protection Platform delivers comprehensive data protection, threat prevention, governance and compliance for cloud-native application lifecycle.

Read More
NEWS
Remote operations lack remote access security

The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital...

Read More
NEWS
Thales launches Identity Verification Suite

Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...

Read More
NEWS
Half of application security flaws remain open six months after discovery

SOSS Volume 11 finds 76% of applications have at least one security flaw.

Read More
NEWS
Employee education singled out as the biggest cybersecurity weakness during lockdown

Thirty per cent of respondents admit to using unencrypted devices according to latest Apricorn poll.

Read More
NEWS
Zero trust momentum continues

Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of...

Read More
NEWS
Sophos launches Rapid Response service

Sophos has introduced Sophos Rapid Response, thought to be an industry-first, fixed-fee remote...

Read More
NEWS
BeyondTrust predicts the future

BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in...

Read More
NEWS
SaaS security and visbility for IoT and OT networks

Nozomi Networks Vantage empowers a new generation of cyber and physical system security with the...

Read More
NEWS
Integrating endpoint detection and response capabilities

SolarWinds says that SolarWinds® Endpoint Detection and Response (EDR) is now fully integrated...

Read More
NEWS
84 percent of companies have high-risk vulnerabilities on the network perimeter

Positive Technologies performed instrumental scanning of the network perimeter of selected...

Read More
NEWS
The most advanced Kubernetes security solution?

New Kubernetes security posture management (KSPM) and agentless runtime protection empower...

Read More

Videos

CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

By Dael Williamson, EMEA CTO, Databricks.
As AI leads to bigger data centres, power grids and public perceptions may shape what’s actually possible.   By Tate Cantrell, Verne CTO.
By Andre Jay, Director of Technology at Warp Technologies.