AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats facing their network, devices & users.

Read More
Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past 12 months; growing complexity of security estates highlighted as a significant risk.

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More
ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards,...

Read More
Retailers suffer 2x more SQL injection attacks than other industries

Imperva has released the results of the fourth annual Imperva Web Application Attack Report (WAAR),...

Read More
Employees are number one Cyber-security threat

Companies failing to respond to customer demand for proven cyber-security credentials.

Read More
Data security on the road

By Dave Anderson, senior director, Voltage Security.

Read More
Softcat welcomes 36 outstanding new recruits to support growth

Softcat, renowned in the channel for its investment in resource, welcomes 36 new recruits to its...

Read More
The intelligent approach to network security

By Trevor Dearing, EMEA Marketing Director, Gigamon.

Read More

Videos

Nirav Shah, Founder & Director of Technical Excellence at Infrassist, explains that 24x7 IT monitoring and defence is essential for SMBs as an often distributed workforce needs protection around the clock, not...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Katie Coulson, Executive Vice President and General Manager, Skanska Advanced Technology, discusses the many factors which need to be considered when delivering a data centre design and build, including the...

Expert Opinions

By Sergei Serdyuk, VP of Product Management, NAKIVO.
By Alexandra Thorer, Chief Growth Officer at BCS Consultancy.
By Richard Clifford, VP of sales & Solutions EMEA Salute.
By Paul Inglis, Senior Vice President and General Manager at Ping Identity.