Proofpoint joins Open Information Security Foundation

Leader in advanced threat protection remains dedicated to supporting open source initiatives following Emerging Threats acquisition.

Read More
CA Technologies strengthens identity-centric security portfolio

CA Technologies has launched new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe.

Read More
Pulse opens online education centre

Training platform empowers customer development, increases time-to-productivity.

Read More
NEWS
Global cybersecurity - could do better

International survey of information security professionals identifies cloud, mobile devices and...

Read More
‘Segment of One’ for Cloud and Hybrid environment access control

New AppGate XDP release simplifies access security and ensures that all resources – private...

Read More
NEWS
Security heads 2016 agenda

Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...

Read More
NEWS
Threat Intelligence identified as 2016 investment priority

Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.

Read More
Achieving compliance objectives

BeyondTrust has introduced the latest version of the company’s privileged password and...

Read More
NEWS
Singapore deploys Gemalto's authentication solution

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides...

Read More
Banking on compliance

Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help...

Read More
Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...

Expert Opinions

In an exclusive conversation with Devang Mehta of Infrassist, the focus is on how MSPs can move beyond reactive firefighting and build for sustainable growth. Mehta explains how MSPs must rethink how they...
By Graham Jarvis, Freelance Business and Technology Journalist