Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration capabilities through the VMware NSX™ network virtualization platform to provide security managers with a unified security policy experience with central management and automation. Through these...

Read More
How to ensure your site is secure

By Liam Enticknap, Network Solutions Architect, Peer 1 Hosting.

Read More
Dell unveils ‘powerful new solutions’ at Vmworld

Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...

Read More
Focus is on software security design flaws

Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...

Read More
HyTrust partners with Intel

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...

Read More
VMware unveils vCloud Air Mobile and Hybrid Cloud Services

Continuing the rapid expansion of its VMware vCloud® Air™ hybrid cloud platform, VMware,...

Read More
‘Comprehensive’ protection for the hybrid data centre

McAfee, part of Intel Security, has announced key advancements to its Server Security Suites...

Read More
VMware delivers innovations for the open, agile, secure software-defined data centre

VMware, Inc. has announced new virtualization, cloud management and integrated OpenStack solutions...

Read More
Is £266bn just the tip of the Cybercrime iceberg?

By Mark Sparshott, EMEA Director at Proofpoint.

Read More
Tripwire survey examines views of information security professionals at annual IT security conference

Tripwire, Inc. has announced the results of a survey of 215 attendees at the Black Hat USA 2014...

Read More
Data breaches prompt UK businesses to re-think data protection strategy

Trend Micro research finds majority of organisations lack customer notification processes required...

Read More
UK workforce is ‘doing IT’ for themselves

IT leaders see the value of end user computing strategies but risk and compliance issues prohibit...

Read More

Videos

Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...

Expert Opinions

By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By Troels Rasmussen, GM of Security, N-able.
By Krishna Narayanaswamy, Chief Technology Officer (CTO) at Netskope.