NEWS
Organisations failing to meet basic level of PAM maturity

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate data from more than 450 organizations across the globe that participated in Thycotic’s Q4 2018 PAM Maturity Model assessment survey to-date.

Read More
NEWS
Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now possible.

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes...

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and...

Read More
NEWS
Carbonite closes acquisition of Webroot

Transaction combines data backup and recovery technology with cybersecurity platform to deliver...

Read More
NEWS
Beware the backdoor

69% of security professionals believe countries with government mandated encryption backdoors...

Read More
NEWS
Swivel Secure partners with BeSecure IT

Multi-factor authentication provider, Swivel Secure, has announced its new partnership with...

Read More
NEWS
Coleg Cambria chooses LogRhythm’s NextGen SIEM Platform to centralise security operations

LogRhythm’s platform to optimise and simplify security workflows at UK education provider.

Read More
NEWS
Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...

Read More

Videos

Mary-Ann Clarke, AECOM’s Director of Data Centre Delivery, believes that developers, utilities, planners and government need to work together to accelerate investment in grid reinforcement and smart energy...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...
In this interview, Phil Skelton, Senior Director of International Sales at eSentire, explores why modern defence demands multi-signal MDR that correlates identity, endpoint, cloud, network, and vulnerability...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...

Expert Opinions

Paul Swaddle, Product Manager at Serios Group and Lucy Batley, founder of AI consultancy Traction Industries discuss how organisations can combine data and AI to create meaningful business impact.
AI growth makes datacenters prime targets for drones, requiring radar-led, multi-sensor airspace security to detect threats, prevent disruptions, and protect critical infrastructure. By Kara Quesada,...
By Ben Matthews, Senior Director of Engineering at Stack Overflow.
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.