Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT security professionals during the week of April 20th in San Francisco. The survey data reve­als that most IT security professionals acknowledge they don’t know how to detect or remediate quickly...

Read More
Gigamon and JDSU announce integration of Software Defined Visibility APIs

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s breakthrough innovation – Software Defined Visibility, a framework that allows customers, security and network equipment vendors, as well as managed service providers, to control and program...

Read More
Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are unaware of the risks

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More
Setting the standard for secure managed file transfer analytics and reporting

Ipswitch has announced the release of Ipswitch Analytics, a new reporting and monitoring solution...

Read More
Rapid7 brings Strategic Security Advisory Services to EMEA 

Rapid7will offer its Strategic Advisory Services in EMEA to help security executives and teams...

Read More
NTT Communications to trial enhanced DDoS Defense Orchestrator System

Aims to become Japan's first telecom to provide multihomed anti-DDoS service.

Read More
Scandinavian bank in Lithuania chose Proact for the modernisation of its IT infrastructure

IT infrastructure is one of the key structural components of the bank. It faces continuously...

Read More
Bloxx moves real-time content filtering into the Cloud

Bloxx is to enter the Cloud market with the launch of Tru-View Cloud, a new cloud-based web...

Read More
Bromium enhances endpoint protection

Bromium hasannounced the general availability of Bromium Enterprise Controller (TM) (BEC), a...

Read More
Zero-day attacks pose the biggest threat

Check Point’s research of over 16,000 Security Gateways globally shows targeted attacks and...

Read More

Videos

Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Chris Coward, Director of Project Management and Anna Rantala, Marketing Manager – both at BCS - talk through the company’s recently launched Athlete Career Transition Programme, designed to address the...
Adam Raymond, Sales Manager UK & Ireland at SWEP International, discusses the increasing pressures on data centre cooling thanks to the AI explosion, explaining how liquid cooling solutions - rear door heat...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
By Kevin Jones, Consultancy Director, Schneider Electric UK&I.
By Chris Carreiro, CTO at Park Place Technologies.