Espion enhances its Cloud Assurance credentials

Leaders in managing and securing corporate information Espion, has further strengthened its cloud security expertise through corporate membership of Cloud Security Alliance (CSA) - the global pioneers of promoting best practices for security assurance within cloud computing.

Read More
UK users unable to detect phishing

McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing continues to be an effective tactic for infiltrating enterprise networks.

Read More
Infosys to provide IT Services to BP

New five-year, group-wide strategic supplier agreement expands decade-long partnership.

Read More
Imperva offers support for Cloudera Enterprise

Imperva Inc. has announced the availability of SecureSphere Support for Cloudera. Imperva’s...

Read More
Avecto and Caretower form premier partnership

IT security solutions specialist, Caretower, has strengthened its market position after being named...

Read More
Open-Xchange unlocks OX Guard

New security solution unifies security and usability, enabling users to easily send, read, store...

Read More
Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations...

Read More
Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal...

Read More
Elitetele.com launches managed firewall services to help firms secure increasingly complex IT landscape

Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next...

Read More
Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with...

Read More
Failure of iCloud brings richer pickings for hackers

Computer security expert issues warning, in light of celebrity picture leaks.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer at Salute.
By Dmitry Panenkov, CEO and founder of emma, the cloud management platform.
By Haris Pylarinos, Founder and CEO of Hack The Box