Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the latest version of the risk assessment software vsRisk™, which is fully compatible with ISO27001:2013. The new version also presents the opportunity to apply it to multiple information security...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and compliance expertise, is launching a range of unique products and services designed to help British organisations implement the newly released Cyber Essentials Scheme Requirements. These include a Cyber...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement, Imperva is addressing the massive security gaps left by increasingly complex IT infrastructures, and is delivering industry leading protection against insider threats.

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
ManageEngine fortifies enterprise security log analytics

New SIEM GA features: real-time event correlation, complete user audit trail, ISO 27001 reporting,...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Software warnt vor Ausfällen unternehmensinterner Anwendungen 

Neues Whitepaper von Paessler: Applikationen und Services mit Netzwerk-Monitoring überwachen

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
Understanding risk from a business perspective is a top security concern

Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...

Read More
Dell secures critical business data and devices

Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...

Read More

Videos

Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Tony Hasek, CEO & Co-founder, Goldilock Secure.
By Jake Madders, Director and Co-Founder, Hyve Managed Hosting.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.