Validating end-to-end network security access for Cloud environments

Ixia has launched BreakingPoint Cloud, a SaaS solution that safely models data breaches and threat vectors to deliver quantifiable evidence and insights into the effectiveness of organizations’ cloud-based data and application security, whether private, public or hybrid.

Read More
ThreatConnect now provides one place to visualise intelligence and operations

ThreatConnect Dashboards and other features in latest release allow customers to analyse all relevant intelligence and metrics within ThreatConnect.

Read More
Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of privileged accounts.

Read More
GDPR confusion

Businesses more concerned with security costs than meeting ‘State of the Art’ requirement.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises...

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More
Riverbed and Zscaler deliver unified Cloud networking and security solution

Seamless integration of Riverbed SteelConnect SD-WAN and Zscaler cloud security platform...

Read More
Ransomware to rule

Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased in 2017.

Read More
NEWS
Global CISOs concerned about cybersecurity readiness

Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...

Read More
NEWS
Dark web dangers

Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...

Read More
Security challenges delay enterprise migrations to the Cloud

Enterprises embracing hybrid cloud, but need better visibility and security management processes to...

Read More
NEWS
Reducing the risk of data breaches

Centrify encourages businesses to increase their Identity and Access Management maturity to...

Read More
Cyber security start-up aims to simplify cyber security for SMEs

A tech start-up is aiming to simplify cyber security with the launch of its new automated software...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, shares his future predictions about enterprise storage that CTOs should take into consideration and also advises as to what enterprises should be thinking...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...
Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...

Expert Opinions

New report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta - but substantial score improvements for users applying...
By Scott McKinnon, Chief Security Officer, UK&I at Palo Alto Networks.
By Frank Jones, CEO, IMS Evolve.