Customised, comprehensive plans needed to combat network intrusions

BakerHostetler’s 2017 Data Security Incident Response Report confirms that cyberthreats demand attention from the boardroom down to front-line employees.

Read More
NTT Security combines regional assets to launch The Global Threat Intelligence Center

NTT Security, the specialised security company of NTT Group, has formed the Global Threat Intelligence Center (GTIC) to replace what was known formerly as the Security Engineering and Research Team (SERT), which last year transitioned under the NTT Security brand.

Read More
NEWS
Confusion over Cloud security

AlienVault RSA survey finds that one third of respondents describe the state of security monitoring within their organization as “complex and chaotic”.

Read More
NEWS
Industrial computers under attack

On average two-in-five computers, related to the technological infrastructure of industrial...

Read More
Cybercriminals are building an 'army of things'

Fortinet has published the findings of its latest Global Threat Landscape Report.

Read More
NEWS
Gemalto releases findings of 2016 Breach Level Index

Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases...

Read More
Atos and Siemens expand their strategic relationship

Providing cybersecurity solutions for the utilities, oil and gas industries in the US.

Read More
Mobile working a major cause of data breaches

A third of companies say they have experienced a data loss or breach as a direct result of mobile...

Read More
NEWS
Industrial IoT coming under cyber attack

Study reveals most organizations take additional precautions to secure IIoT.

Read More
NEWS
Global cybersecurity report reveals misaligned incentives

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity...

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as...

Read More
Connected cars: who controls your car without you knowing?

Kaspersky Lab researchers have examined the security of applications for the remote control of...

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...

Read More

Videos

Thomas Barber, Vice President, Communications Infrastructure and Datacenter at GlobalFoundries, explains how the adoption of silicon photonics in data centres enables ultra-fast data transmission between GPUs...
Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the first ever World Quantum Readiness Day – detailing the very real threat that quantum computing could...
Steve Young, UK SVP and MD, Dell Technologies, explains how can businesses can navigate the high upfront cost of AI while aiming for cost-saving and efficiencies, the importance of adopting an 'AI-first'...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...

Expert Opinions

By Johnny Ellis, Senior Director EMEA Channels, Arctic Wolf.