NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers are actively working to exploit people instead of software flaws to steal money and information for financial gain, espionage, and to establish footholds for future attacks.

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a new, unified approach to encryption and key management, SecureDoc 8.2 will enable industry-leading data security across endpoints, data centres, hyper-converged infrastructures and into the cloud...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour, system security, performance and operations, and simplify IT infrastructure.

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More
Unisys appoints Mathew Newfield as Chief Information Security Officer

Former IBM security leader brings wealth of experience working in both internal and client-facing...

Read More
Cryptomining malware that works outside the web browser on the rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing...

Read More

Videos

Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...

Expert Opinions

By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.
By Dan Bridges, Technical Director, Dropzone AI.