A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small...

Read More
ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches.

Read More
Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural executable analysis to protect corporate networks from file-based and file-less targeted attacks and phishing campaigns.

Read More
NEWS
Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company...

Read More
A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives...

Read More
Kraynak joins Imperva

Mark Kraynak has been appointed Imperva’s Senior Vice President and General Manager of the...

Read More
AlienVault appoints Catherine Kelly as VP of EMEA Sales

Catherine Kelly has joined AlienVault as Vice President of Sales to expand its business...

Read More
Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet...

Read More
Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle...

Read More
PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More
Preventing data exfiltration in real time

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data...

Read More
Resilient Systems joins IBM Security App Exchange community

Resilient Systems Incident Response Platform is part of collaborative development to stay ahead of...

Read More
Exostar launches Cybersecurity Risk Assessment Solution

Exostar has introduced the  Partner Information Manager (PIM), a new, modular solution...

Read More
Tufin appoints Sales Vice President for EMEA

Tufin has appointed Ian Rigby as Vice President of Sales for the EMEA region. Based...

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres.
By Derek Thompson, Senior VP & GM, EMEA, Workato.