Imperva acquires Tomium Software assets

Imperva, Inc. has acquired real-time mainframe security auditing agents from Tomium Software.

Read More
Hogarth Worldwide erweitert mit Level 3 transkontinentales Content Sharing sowie die Sicherheit und Speicherung von Werbeinhalten

Das zum WPP-Konzern gehörende Unternehmen wählt Level 3 um seinen Produktionsteams den Austausch und die Lokalisierung von mehreren Terabytes an Video- und anderen Digitalinhalten zu ermöglichen

Read More
Palo Alto Networks launches the industry’s ‘fastest’ next-generation firewall

Palo Alto Networks® has announced what it says is the industry’s most powerful next-generation firewall, the PA-7050. With next-generation firewall functions, such as full application enablement, IPS, AV and WildFire™ active on all traffic, the PA-7050 delivers consistent...

Read More
Imperva to acquire Incapsula and Skyfence

Combination creates industry-leading cloud security and compliance offerings while filling...

Read More
Acronis offers secure mobile content management promotion

Acronis® has announced a promotion for Acronis mobilEcho with MobileIron AppConnect to help...

Read More
TDAzlan expands

TDAzlan, the value-added enterprise distribution arm of Tech Data UK, has extended the reach of its...

Read More
Hybrid DNS engine to protect online services

‘Breakthrough’ solution addresses DNS server vulnerabilities.

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Citrix and Palo Alto Networks team

Citrix has announced the immediate availability of the Palo Alto Networks VM-Series, a...

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
IBM brings Watson to Africa

IBM has launched a 10-year initiative to bring Watson and other cognitive systems to Africa in a...

Read More
Datenklau bei Yahoo! – Wie Nutzer und Unternehmen sich schützen sollten

Yahoo! hat seine Nutzer angewiesen, ihre Passwörter zu ändern, nachdem es durch eine...

Read More
HP-Studie: Gut 80 Prozent aller Anwendungen mit Sicherheitslücken

Neuer "HP Cyber Risk Report" analysiert Schwachstellen in der...

Read More

Videos

Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

By Markus Nispel, Head of AI Engineering & EMEA CTO, Extreme Networks.
By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.
By Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres.