Unifying physical and Cloud security

Unified security architecture is capable of being mapped, tested and measured; enables more proactive threat prevention and auditable regulatory compliance.

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide...

Read More
Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more employees rely on their mobile devices for both personal and professional activities, the risk of mobile malware and unsafe applications presents challenges for organisations. A recent Harris survey...

Read More
Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash...

Read More
Hunt for attacks in real-time

See what attacks are hiding in your network traffic with our Cloud or on-premise assessments.

Read More
Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More
SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More
77 percent of executives ‘confident’ in basic security controls

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...

Read More
Painful compliance audits ahead

Frightening lack of awareness of the European Commission’s draft bill that unifies and...

Read More
Fujitsu and Shelter celebrate two year partnership

Innovative charity collaboration sees Fujitsu offer practical support to help the charity achieve...

Read More
Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web...

Read More
Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...

Read More
CA Technologies CEO challenges business and technology leaders to build new capabilities

CEO Mike Gregoire kicked off CA World ’14 with a keynote address to thousands of customers...

Read More
Zycko and ObserveIT announce distribution partnership

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...

Read More

Videos

Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...

Expert Opinions

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.
By Graham Jarvis, Freelance Business and Technology Journalist.
By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
By Luca Rizzo, Segment Manager at ABB Motion High Power.