RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that helps operationalize Business-Driven Security™ architecture by helping to reduce business risk through systematic and continuous enablement for clients to manage identity, protect their assets,...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units. Forcepoint’s businesses – Cloud Security, Network Security, Data & Insider Threat Security and Global Governments – will drive innovation across each product portfolio, while teaming to...

Read More
Thales addresses enterprise encryption key governance for Microsoft Azure

Key management-as-a-service (KMaaS) meets enterprise needs for direct control of encryption keys.

Read More
Gemalto unveils robust encryption solutions

New SafeNet Luna HSM and 100 Gbps high-speed encryptors provide the industry’s fastest speeds and performance to encrypt data.

Read More
Bank of England works with Anomali to improve threat intelligence capabilities

The Bank of England FinTech Accelerator recently ran a proof of concept looking at innovative...

Read More
Gigamon delivers advanced inline SSL solution to eliminate network blind spots

New SSL/TLS decryption/encryption solution provides scalable visibility and management of...

Read More
CyberArk supports Amazon Inspector

CyberArk has introduced expanded privileged account security solutions for Amazon Web Services...

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
ThreatConnect announces agreement with BT

BT Security Threat Intelligence now with ThreatConnect platform.

Read More
ForeScout extends visibility and control capabilities to the Cloud

ForeScout’s new solution for Amazon Web Services enables visibility into cloud workloads on...

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
Imperva acquires data security assets from Camouflage Software

Acquisition enables Imperva customers to increase user access to sensitive data assets while...

Read More
Lastline upgrades

Lastline has introduced its latest enhancements to Lastline Enterprise for Global 5000...

Read More
Reducing privileged credential risk

CyberArk has issued a new research report that recommends an accelerated 30-day plan to improve...

Read More

Videos

Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Data Centre World 2026
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...

Expert Opinions

In an exclusive conversation with Devang Mehta of Infrassist, the focus is on how MSPs can move beyond reactive firefighting and build for sustainable growth. Mehta explains how MSPs must rethink how they...
By Iain Bowes, Head of Management Systems Assurance for TÜV SÜD Business Assurance, a global provider of auditing and certification services that help organisations to gain in-depth insights of how corporate...
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...