Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments.

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT technology managed services, has formed the company's Cybersecurity Products Division, including a Research and Development (R&D) Center in Lowell, MA.

Read More
NEWS
DDoS attacks are longer and 'more demanding'

The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The longest attack in the quarter was active for 277 hours (more than 11 days) – which is a 131 per cent increase compared to Q1. This is so far a record for the year, says the Q2 2017 botnet DDoS...

Read More
NEWS
Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...

Read More
NEWS
Legacy data systems present a red flag for GDPR compliance

Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
MapR and Talend collaborate

Combined offering accelerates GDPR compliance by addressing key requirements around data inventory,...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of...

Read More
NEWS
DDoS attacks on the increase

Financially motivated DDoS attacks driven by criminal extortion have garnered security...

Read More
NEWS
McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More
Veritas introduces Classification Engine for intelligent data management

Data Insight 6.0 and Enterprise Vault 12.2 are first Veritas solutions to support...

Read More
Epose greatest compliance risk

A major GDPR awareness survey of senior IT executives - across 200 medium to large UK...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge
By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.
By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.