Eliminating security gaps

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches multiple ISMS version Of vsRisk

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the latest version of the risk assessment software vsRisk™, which is fully compatible with ISO27001:2013. The new version also presents the opportunity to apply it to multiple information security...

Read More
IT Governance launches Cyber Essentials products

IT Governance, the global leader in information security, IT governance, risk management and compliance expertise, is launching a range of unique products and services designed to help British organisations implement the newly released Cyber Essentials Scheme Requirements. These include a Cyber...

Read More
Imperva advances protection against data breaches

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement, Imperva is addressing the massive security gaps left by increasingly complex IT infrastructures, and is delivering industry leading protection against insider threats.

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
ManageEngine fortifies enterprise security log analytics

New SIEM GA features: real-time event correlation, complete user audit trail, ISO 27001 reporting,...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Software warnt vor Ausfällen unternehmensinterner Anwendungen 

Neues Whitepaper von Paessler: Applikationen und Services mit Netzwerk-Monitoring überwachen

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
Understanding risk from a business perspective is a top security concern

Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...

Read More
Dell secures critical business data and devices

Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...

Read More

Videos

Vivek Behl, Vice President, Strategy at WalkMe, discusses the findings of the company’s annual report, The State of Digital Adoption 2025, Special AI Edition. This year’s report focuses on AI adoption in...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Tony Kelly, Director of Alliances, EMEA at Fivetran, explains what Fivetran’s enhanced partner programme means – higher incentives via the four partner tiers, deeper go to market collaboration and expanded...

Expert Opinions

By Zeki Turedi, Field CTO, EMEA, CrowdStrike.
Harnessing waste heat to reduce operating costs and improve sustainability.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.