Financial apps - secure or not?

Two thirds of online banks still have at least one critical vulnerability, even as the numbers decline.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Thunder defeats cyber attacks

A10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder TPS (Threat Protection System) with A10’s Non-stop DNS solution across multiple data centres to ensure resilience from escalating cyber-attacks and scale its mission critical DNS services.

Read More
Security orchestration across major Cloud platforms

As they struggle to deal with the speed of business process automation and the exponential growth of corporate data, 66 per cent of enterprises and 49 per cent of SMBs are planning to expand their hybrid cloud infrastructures. At the same time, every second company feels it cannot fully...

Read More
Tripwire expands Cloud Security capabilities

New functionality tackles publicly exposed cloud data; core secure configuration functionality now...

Read More
Helping to validate Microsoft Azure DDoS Protection Service defences

BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
Legacy email systems - a significant security risk?

Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...

Read More
A10 Networks introduces One-DDoS Protection

A10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only...

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More

Videos

Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...
Vivek Behl, Vice President, Strategy at WalkMe, discusses the findings of the company’s annual report, The State of Digital Adoption 2025, Special AI Edition. This year’s report focuses on AI adoption in...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...

Expert Opinions

By Duncan Roberts, Associate Director at Cognizant Research.
By Juan Colina, EMEA data centre & IT segment leader, Eaton.
By Frankie Woodhead, Chief Product & Technology Officer, Thrive.