Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables customers to rapidly extract security metadata, including Indicators of Compromise (IOC), and fast-track that information to reporting tools to speed Mean Time to Identify (MTTI) and Mean Time to...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More
Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all accreditation requirements across Durham and thwart data breaches.

Read More
NEWS
Employees consistently flout security policies, say IT managers

Despite investment in cyber security, employees are still putting organisations at risk, according to new research from Databarracks.

Read More
Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack...

Read More
NEWS
Tech giants collaborate on zero outage

Founding Members Brocade, Cisco, Dell EMC, Hitachi Data Systems (HDS), Hewlett Packard Enterprise...

Read More
Swamped by security

Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...

Read More
Pulse Secure adds device discovery and profiling

Highly automated advanced detection and classification of managed and unmanaged devices secures...

Read More
Datto launches ransomware protection

Datto unveils automatic ransomware detection and recovery for small, midsized businesses.

Read More
Atos offers global prescriptive threat detection and instantaneous remediation

Atos has revealed a new managed security service provider (MSSP) partnership with Intel Security....

Read More
NEWS
SonicWall spins out from Dell Software Group

Francisco Partners and Elliott Management complete acquisition of Dell Software Group; spin out...

Read More
Flex Tap to fortify business critical application security

Ixia has introduced the latest addition to the company’s reliable network taps family of...

Read More
Recovering ransomware-encrypted files without a backup

ExtraHop has introduced a new version of its award-winning ransomware mitigation offering that,...

Read More
AppGate upgrade

Cryptzone has introduced the newest version of AppGate that empowers companies with a...

Read More
StarLink opens European hub in London

Cybersecurity solutions value-added distributor aims to double EMEA turnover in three years through...

Read More

Videos

Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...

Expert Opinions

By Sam Kirkman, Director of Services for EMEA at NetSPI.
By Kate Steele, Director, EMEA HPC/AI at Lenovo Infrastructure Solutions Group.
By Subhashis Nath, AVP and Head of Analytics, Infosys.
By Manuel Sanchez, Information Security and Compliance Specialist, iManage.