Security compliance 'time bomb'

Line-of-business (LoB) leaders and IT are anxious about IoT/OT security due to concern about negative outcomes of a security breach.

Read More
Validating end-to-end network security access for Cloud environments

Ixia has launched BreakingPoint Cloud, a SaaS solution that safely models data breaches and threat vectors to deliver quantifiable evidence and insights into the effectiveness of organizations’ cloud-based data and application security, whether private, public or hybrid.

Read More
ThreatConnect now provides one place to visualise intelligence and operations

ThreatConnect Dashboards and other features in latest release allow customers to analyse all relevant intelligence and metrics within ThreatConnect.

Read More
Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of privileged accounts.

Read More
GDPR confusion

Businesses more concerned with security costs than meeting ‘State of the Art’ requirement.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises...

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More
Riverbed and Zscaler deliver unified Cloud networking and security solution

Seamless integration of Riverbed SteelConnect SD-WAN and Zscaler cloud security platform...

Read More
Ransomware to rule

Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased in 2017.

Read More
NEWS
Global CISOs concerned about cybersecurity readiness

Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...

Read More
NEWS
Dark web dangers

Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...

Read More
Security challenges delay enterprise migrations to the Cloud

Enterprises embracing hybrid cloud, but need better visibility and security management processes to...

Read More
NEWS
Reducing the risk of data breaches

Centrify encourages businesses to increase their Identity and Access Management maturity to...

Read More

Videos

Keith Sullivan, Director of Strategic Innovation at AFL, explains what meshing means in the context of data centres and why it is particularly important when it comes to GPU-intensive, AI compute workloads....
Paul Savill, Global Practice Leader for Network and Edge at Kyndryl. Spends his time helping major organisations modernise their infrastructure to make the most of AI, strengthen security and prepare for the...

Expert Opinions

In Houston’s industrial sector, Champion Machine Tools has long been known for precision manufacturing, fast turnaround, and the kind of craftsmanship that keeps America’s supply chains running. But as...
By Andre Jay, Director of Technology at Warp Technologies.
By Alan Elder, Fellow — Industry Relations, Johnson Controls.
By Rob Gates, Chief Architect & Innovation Officer at Duco.