Prioritising and streamlining security operations

Tenable delivers improved security visibility and critical context to help security teams remediate vulnerabilities and mitigate security threats.

Read More
Providing security automation at scale for Linux

Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems.

Read More
DNS attacks costing businesses more than $1 million

But almost 30 per cent of organisations still don’t rate DNS as an important part of their business.

Read More
ManageEngine adds SSL Certificate Management to its Privileged Identity Management Suite

ManageEngine has introduced SSL certificate management support in Key Manager Plus, its comprehensive, web-based solution for managing digital keys. Available immediately, the new version of Key Manager Plus provides visibility and centralised control over the entire life cycle of...

Read More
Security and speed are the main barriers to a connected workforce

A survey conducted by Nexsan has revealed that data security and download speeds were the...

Read More
NEWS
Over a third of organisations are yet to develop a cyber-attack response plan

Lack of preparation by businesses alarming due to multi-faceted threat landscape.

Read More
Proofpoint delivers threat context into Splunk software

Multiple technology integrations enable Proofpoint email and social media context to be easily...

Read More
A clouded security picture?

Blue Coat Systems has revealed the initial results from an online study conducted by YouGov of...

Read More
Chemring launches 'world’s first AI cyber security system'

Chemring Technology Solutions has launched ForensicAI, an advanced system of artificial...

Read More
NEWS
Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were...

Read More
Trustwave and CounterTack team

Trustwave and CounterTack have formed an alliance to help businesses minimize the impact of...

Read More
WatchGuard acquires Hexis HawkEye G

Resulting technology integration will enable organisations to prevent, detect, correlate, and take...

Read More
ExtraHop debuts ransomware bundle

ExtraHop has introduced its new ransomware bundle for EMEA businesses to proactively prevent,...

Read More
Turn-key threat intelligence gateway

Filtering traffic from malicious IP addresses at line speed boosting efficiency and...

Read More

Videos

Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Egli Kaja, Project Manager, BCS, describes his journey from professional footballer to data centre project management, as part of BCS’s Athlete Career Transition Programme, designed to address the data...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.
By Peter Miller, Sales Manager at ETB Technologies.
By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
By Chris Carreiro, CTO at Park Place Technologies.