NEWS
ThreatQuotient introduces new ThreatQ TDR Orchestrator features

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses industry needs for simpler implementation and more efficient operations.

Read More
NEWS
Paying the ransom is still the most common response to a ransomware attack

Although progress has been made, organisations are still paying out.

Read More
NEWS
Cybersecurity professionals fear severe disruption from CNI cyberattacks

New research from Forcepoint exposes how CNI cybersecurity professionals need greater support to prevent burnout from the pressure of securing high-threat, high-complexity environments.

Read More
NEWS
Neustar Security Services expands partner network in EMEA

New partners help joint customers enhance security and improve resilience.

Read More
NEWS
New data reveals nearly half of businesses are just beginning to address identity security

SailPoint Technologies Holdings has unveiled the findings of a new research report titled, ‘The...

Read More
NEWS
Ransomware attacks continue to increase

20% of all reported attacks occurred in the last 12 months.

Read More
NEWS
Confidence grows in addressing hybrid security challenges

84% of IT professionals have some degree of confidence in their user access security systems to...

Read More
NEWS
Allurity acquires Aiuken Cybersecurity

Allurity has acquired Spanish multinational Aiuken Cybersecurity, as an important step in its...

Read More
NEWS
Commvault enables early threat detection and zero loss strategy

A first among data protection vendors, the new cyber deception service detects and contains...

Read More
NEWS
Solent NHS Trust selects Atos for managed digital workplace and security services

Atos has been awarded a three-year contract with Solent NHS Trust to manage, support and secure its...

Read More
NEWS
ThreatQuotient enhances data-driven automation capabilities

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses...

Read More
NEWS
Aqua Security targets software supply chain attacks

Development and security teams can now proactively address the most critical software supply chain...

Read More
NEWS
CrowdStrike to acquire Reposify

Reposify’s external attack surface management (EASM) capabilities expand CrowdStrike’s robust...

Read More
NEWS
Data sovereignty strategies embraced by 98% of IT decision makers

Almost half surveyed say they are using hybrid cloud or local cloud service providers as an...

Read More
NEWS
2022 Cybersecurity Census Report reveals lack of preparedness against rising cyberattacks

Almost one in five (17%) UK businesses are subjected to approximately two cyberattacks every...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, looks at what the biggest challenges facing enterprises that want to adopt GenAI solutions today, the solutions that Infinidat offesr to facilitate easier AI...
Annabel Helm, Managing Director, Datacloud, techoraco, outlines the success of the Datacloud Global Congress 2025 - celebrating 20 years of bringing together data centre and digital infrastructure...
Annabel Helm, Managing Director, Datacloud, techoraco, outlines the success of the Datacloud Global Congress 2025 - celebrating 20 years of bringing together data centre and digital infrastructure...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...

Expert Opinions

By Sean Tilley, Senior Director Sales of EMEA at 11:11 Systems.
By Daniel Sukowski, Global Business Development Industry & IIOT, Paessler GmbH.
By Irvin Shillingford, Hornetsecurity’s Regional Manager for the UK, Benelux, and Nordic Regions.
Q&A with Mark Scrivens, FPT Software UK Chief Executive Officer, FPT Corporation.