Firms missing out with do-it-yourself approach to Threat Intelligence

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More
A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small...

Read More
ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches.

Read More
Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural...

Read More
NEWS
Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company...

Read More
A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives...

Read More
Kraynak joins Imperva

Mark Kraynak has been appointed Imperva’s Senior Vice President and General Manager of the...

Read More
AlienVault appoints Catherine Kelly as VP of EMEA Sales

Catherine Kelly has joined AlienVault as Vice President of Sales to expand its business...

Read More
Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet...

Read More
Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle...

Read More
PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More
Preventing data exfiltration in real time

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data...

Read More
Resilient Systems joins IBM Security App Exchange community

Resilient Systems Incident Response Platform is part of collaborative development to stay ahead of...

Read More
Exostar launches Cybersecurity Risk Assessment Solution

Exostar has introduced the  Partner Information Manager (PIM), a new, modular solution...

Read More

Videos

Tom Glover discusses the findings of the company’s recent Q1 2025 EMEA Data Centre Report, which reveal potential challenges around tariffs and wider geopolitical tensions, power constraints and demand...
At Data Centre World Frankfurt 2025, we caught up with Claudia Ludenbach from TRILUX to hear about the company’s presence at the event and their role in the data centre space. Watch the full interview to...
We spoke with Jeffrey Neervoort from Salute during Data Centre World Frankfurt 2025 to hear about their presence at the event and role in the data centre ecosystem.
Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...

Expert Opinions

By Avi Perez, CTO of Pyramid Analytics.
By Laurent Doguin, Director, Developer Relations & Strategy, Couchbase.
By Sebastian Murphy, Technical Director - Data Centers EMEA, blu-3, Shaheed Salie, Technical Manager, blu-3, and Warren McTackett, blu-3.