Majority of businesses are still struggling to secure data effectively

Research reveals 69 per cent of businesses are lacking in terms of proper data management, casting doubt on their ability to comply with GDPR.

Read More
Freedom of Choice for identity governance deployment

SailPoint Technologies Holdings has unveiled the company’s comprehensive delivery strategy that provides deployment options for their identity governance platform, spanning: software-as-a-service, in the public cloud, in their own data center or from a managed service provider....

Read More
Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More
NEWS
Proofpoint completes Wombat acquisition

Proofpoint has completed its acquisition of Wombat Security Technologies, Inc., a leader for phishing simulation and security awareness computer-based training. By collecting data from Wombat’s PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by...

Read More
NEWS
Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and...

Read More
NEWS
Disparity between IoT adoption and cybersecurity readiness

Trustwave has released the “IoT Cybersecurity Readiness Report” which assess the current and...

Read More
Report focuses on ransomware and malware threats

KnowBe4, the world’s largest provider of security awareness training and simulated phishing, has...

Read More
Fortinet delivers third generation of network security

FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security...

Read More
Splunk agrees to acquire Phantom

Splunk Inc. is to acquire Phantom Cyber Corporation, a leader in Security Orchestration,...

Read More
NEWS
du selects Fortinet

UAE-based telecommunications service provider du – from Emirates Integrated Telecommunications...

Read More
NEWS
CrowdStrike Global Threat Report reveals the biggest cyber crime and targeted intrusion trends

Following the trickle-down effect of advanced ‘military-grade’ tools, report uncovers...

Read More
Trustonic launches IoT device security solution

Blockchain-based Digital Holograms, trusted device provisioning and a modular, secure OS combine to...

Read More
NEWS
Shop Direct automates cyberattack detection with Vectra

The United Kingdom’s second-largest pureplay digital retailer uses artificial intelligence to...

Read More
NEWS
Email attacks continue to cause headaches

Over one-third of all security incidents start with phishing emails or malicious attachments sent...

Read More
NEWS
Costs not customers the major security breach concern

Sixty-three per cent of C-suite more concerned about paying for the costs of a cybersecurity...

Read More

Videos

Anna Rantala, Marketing Manager at BCS, discusses the company’s new branding – a refresh that is about showing the world the BCS that already exists - modern, dynamic, and human at its core. Anna explains...
Mark Jow, Gigamon Technical Evangelist, discusses the company’s recent report, “CISO Insights: Recalibrating Risk in the Age of AI”, which reveals how global CISOs are reshaping 2026 cybersecurity...
Stuart Robson-Frisby as Vice President, Worldwide Channel at Netwrix, outlines the company’s plans to scale its channel-first go-to-market strategy, with his appointment and that of Frank DeCicco as Head of...
Dr Aleksandr Donodin, based in the Aston Institute of Photonic Technologies (AIPT), has received just one of 12 fellowship grants from The Royal Academy of Engineering to support his work examining fibre-optic...

Expert Opinions

By Dmitry Panenkov, CEO and Founder of emma, the cloud management platform.
By Rob Gates, Chief Architect & Innovation Officer at Duco.
By Gordon Johnson, Senior CFD Manager, Subzero Engineering.
By Harqs Singh, CTO and Founder, InfraPartners.