Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More
Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks...

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make...

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More
Innovative ICT infrastructure is the foundation of a better connected smart nation

Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.

Read More
FortyCloud available IBM’s Cloud Marketplace

FortyCloud for IBM provides an extensive security solution to assist IBM Cloud customers meet...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More

Videos

David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, covers cybersecurity threats and risk mitigation.
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, looks at consolidated data protection - endpoints and SaaS.

Expert Opinions

By Kate Steele, Director, EMEA HPC/AI at Lenovo Infrastructure Solutions Group.
By Gordon Mueller-Schlomka, Optical Connector Product Designer, Corning Optical Communications.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.
By Jon Bance, chief operating officer at Leading Resolutions.