AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the key security features of Amazon Web Services and provides tips on best practice.

Read More
HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More
Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of...

Read More
Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...

Read More
Trustwave plans global expansion in Managed Security Services

Follows the completion of acquisition by Singtel; combines Singtel’s extensive customer reach...

Read More
Almost a third of organisations unable to detect intruders on network  

New Lieberman Software study reveals organisations are relying on traditional IT security solutions...

Read More
Kaspersky Lab appoints Exertis UK Ltd as new B2B channel distributor

Kaspersky Lab has extended its partnership with Exertis UK Ltd, a leading UK distributor providing...

Read More
Varonis and HP interoperability

Varonis Systems has announced the interoperability of its DatAdvantage and DatAlert solutions with...

Read More
Check Point introduces CPU-level threat prevention solution  

Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.

Read More
VMware presents the software-defined data centre - at scale

Designed to dramatically simplify the build out and ongoing operations of software-defined data...

Read More
Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...

Read More
Dell simplifies path to Cloud, Virtualization and VDI

New release of Dell Active System Manager supports deep integration with the VMware portfolio to...

Read More
Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for...

Read More
AirGate accesses DDoS protection services

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the...

Read More

Videos

Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...

Expert Opinions

By Erin Yepis, Senior Analyst, Market Research and Insights, Stack Overflow.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.