Imperva acquires data security assets from Camouflage Software

Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk.

Read More
Lastline upgrades

Lastline has introduced its latest enhancements to Lastline Enterprise for Global 5000 companies. The Spring 2017 Release adds capabilities to detect and eliminate browser based-attacks, speed incident investigation for security professionals, and provide early warning of unusual or...

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR) creates more transparency on cyber-security.

Read More
Nordic pioneers join forces

Sofigate and 3gamma, the biggest IT management consulting companies in the Nordics, are joining forces. As Sofigate acquires 3gamma, the joint company will have offices in four countries: UK, Denmark, Sweden and Finland. By 2020, the company is aiming to grow into the leading IT management...

Read More
Aspire stops DDoS attacks

Aspire Technology Solutions has deployed Flowmon Networks' anti-DDoS intelligence to defend...

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
RedSeal extends digital resilience platform

RedSeal has introduced enhancements and new integrations for its market leading network modeling...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
NEWS
F5 introduces comprehensive application security solutions for the digital economy

New solutions give customers the protection and intelligence required to keep applications and user...

Read More
Secure Cloudlink appoints former HPE VP, Lee Hughes, as Chief Sales and Marketing Officer

Cyber security specialist, Secure Cloudlink has appointed former Hewlett Packard Enterprise (HPE)...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Certificate-related outages affect 79 percent of businesses

New study from Venafi finds inadequate cryptographic controls significantly impact reliability...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More
Intelligent malware prevention just got smarter

Wedge Networks adds cloud-based malware analyzer option to the AI powered Wedge Advanced...

Read More

Videos

Keith Norman, Chief Marketing & Sustainability Officer of Lyten, explains the reasons behind the company’s acquisition of Northvolt’s battery assets in Sweden, with the site expected to resume operations...
Drew Gravitt is Senior Director of Distributed Generation & Microgrid Sales at Mission Critical Group (MCG) explains how the demand for data centres is surging due to AI and digital services and how this is...
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...

Expert Opinions

Why visibility into supporting operational systems matters just as much as protecting core IT.
By Frank Warren, SVP, Global Operations, Park Place Technologies.
By Stewart Hunwick, Field CTO, Storage Platforms and Solutions, Dell Technologies.
By Sergei Serdyuk, VP of Product Management, NAKIVO.