NEWS
79% of IT leaders see a worrying ‘Protection Gap’

Veeam Software has revealed that UK and Irish businesses are headed for a data protection emergency.

Read More
NEWS
Almost a third of malicious attacks target shadow APIs

Cequence Security has released its first half 2022 report titled, “API Protection Report: Shadow APIs and API Abuse Explode.” Chief among the findings was approximately 5 billion (31%) malicious transactions targeted unknown, unmanaged and unprotected APIs, commonly referred to as shadow APIs, making this the top threat challenging the industry.

Read More
NEWS
LogRhythm introduces cloud-native security operations platform

New LogRhythm Axon’s intuitive analyst experience and enhancements to LogRhythm SIEM, NDR and UEBA empower security teams to detect and disarm cyberthreats.

Read More
NEWS
Board members 'unprepared' for cyberattacks

Proofpoint and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, have released their Cybersecurity: The 2022 Board Perspective report, which explores board of directors’ perceptions about their key challenges and risks.

Read More
NEWS
Armadillo partners with Venari Security to raise the curtain on encrypted traffic

The partnership will enable Armadillo’s customers to maintain strong encryption standards, whilst mitigating against malicious activity hidden within encrypted network traffic.

Read More
NEWS
Stor.ai teams up with F5

New partnership will allow stor.ai to offer grocers Web Application Firewall (WAF) capabilities to secure e-commerce platforms and prevent cyber attacks quickly and seamlessly.

Read More
NEWS
'Old-fashioned' authentication still the norm

Majority of employees still rely on username and password authentication.

Read More
NEWS
Illumio Endpoint extends Zero Trust Segmentation

Illumio, Inc., the Zero Trust Segmentation company, has introduced Illumio Endpoint®, a reimagined way to prevent breaches from spreading to clouds and data centers from laptops.

Read More
NEWS
81% of companies had a cloud security incident in the last year

According to new Venafi research, complexity due to increase, as companies plan to host more than half their applications in the cloud.

Read More
NEWS
ThreatQuotient introduces new ThreatQ TDR Orchestrator features

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses industry needs for simpler implementation and more efficient operations.

Read More
NEWS
Paying the ransom is still the most common response to a ransomware attack

Although progress has been made, organisations are still paying out.

Read More
NEWS
Cybersecurity professionals fear severe disruption from CNI cyberattacks

New research from Forcepoint exposes how CNI cybersecurity professionals need greater support to prevent burnout from the pressure of securing high-threat, high-complexity environments.

Read More
NEWS
Neustar Security Services expands partner network in EMEA

New partners help joint customers enhance security and improve resilience.

Read More
NEWS
New data reveals nearly half of businesses are just beginning to address identity security

SailPoint Technologies Holdings has unveiled the findings of a new research report titled, ‘The Horizons of Identity.’ As hyper innovation and rapidly evolving technologies drive global organisations, mature identity programs are becoming business essential to secure and enable digital capabilities at scale. The survey data—based on insights from more than 300 global cybersecurity executives—reveals the current state of the identity security industry and assesses the maturity of enterprise identity programs.

Read More
NEWS
Ransomware attacks continue to increase

20% of all reported attacks occurred in the last 12 months.

Read More

Videos

John Parlee, Chief Information Security Officer (CISO) at Park Place Technologies, discusses the importance of being able to demonstrate to customers, and employees, that your company recognises the importance of IT security, through a combination of standards, Zero Trust and, increasingly, cyber insurance.
Interview with Mallory Beaudreau, Customer Portfolio Director – EMEA at Apptio. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.
Ayelet Elstein, VP EMEA at Lakeside Software, positions the Digital Employee Experience (DEX) within the wider context of the customer experience (CX), emphasising the critical importance of data as a prerequisite for any company-wide approach to improving and optimising end-to-end hybrid IT infrastructure performance and the resulting business benefits.
Interview with Dr Kiri Addison, Threat Detection and Efficacy Product Manager, Mimecast. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.

Expert Opinions

By Luke Neville, Managing Director, i3 Solutions Group.
By Michelle Grafton, Regional Head of Solution Specialists ESA, Iron Mountain.