NEWS
LoRaWAN smart device networks susceptible to hacking

Millions of connected devices used in smart cities, industrial IoT and smart homes could be hijacked to disrupt services, damage equipment and even cover up attacks against infrastructure.

Read More
NEWS
Secure Channels chooses Thales

Thales’ encryption key management will provide data security innovator Secure Channels with secure quantum-resilient cybersecurity technology.

Read More
NEWS
Westcon to distribute Netskope Platform

Westcon, the global technology distributor, has signed a distribution agreement with the Magic Quadrant leader in cloud security, Netskope. The agreement will see Westcon distribute Netskope’s extensible, cloud-native platform across the Benelux, DACH and Nordic regions.

Read More
NEWS
NETSCOUT introduces Arbor Sightline with Sentinel

Layer 7 visibility, inter-provider signalling and orchestrated mitigation support greater DDoS visibility and Smart Protection at the network’s edge.

Read More
NEWS
Training and reporting key to combat phishing attacks

New study finds that nearly 90% of organisations faced business email compromise (BEC) and spear...

Read More
NEWS
Thales unveils Cybels Analytics

Thales's new Cybels Analytics platform combines several approaches to attack detection and...

Read More
NEWS
CREST report highlights problems of stress and burnout among cyber security professionals

A new report published by CREST looks for solutions to the increasing problems of stress and...

Read More
NEWS
Quantum encryption capable of large-capacity data transmission

Quantum encryption technology is now , opening up practical applications in genomic medicine and...

Read More
NEWS
FireEye Mandiant launches Cloud Security Assessments

Cloud Security Assessments help organizations understand cloud-specific threats and security...

Read More
NEWS
FireEye acquires Cloudvisory

Cloudvisory technology to expand cloud security capabilities of FireEye Helix, allowing customers...

Read More
NEWS
Weak passwords cause ransomware woes

As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in...

Read More
NEWS
Nation-state hacks on the rise

Radware has released its 2019-2020 Global Application & Network Security Report. The report found...

Read More
NEWS
CyberArk expands just-in-time capabilities

CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve...

Read More
NEWS
Ubisoft chooses Anomali

Ubisoft chose the Anomali Altitude integrated solutions suite to help secure its global IT...

Read More
NEWS
Business disruption the primary objective of cyber adversaries

CrowdStrike Services Cyber Front Lines Report offers observations gained from the front lines of...

Read More

Videos

Thiri Shwesin Aung, founder and CEO of Nyxium, discusses how she and co-founder, Paul Seurin, have built an agentic AI platform that helps energy and infrastructure developers decide where projects are most...
Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
Keith Norman, Chief Marketing & Sustainability Officer of Lyten, explains the reasons behind the company’s acquisition of Northvolt’s battery assets in Sweden, with the site expected to resume operations...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...

Expert Opinions

By Paul Inglis, Senior Vice President and General Manager at Ping Identity.
By Alexandra Thorer, Chief Growth Officer at BCS Consultancy.
By Sergei Serdyuk, VP of Product Management, NAKIVO.