Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data across cloud and on-prem data lakes .

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR solution. Attacker Behaviour Analytics are detections that reveal unknown variants of successful attacker techniques, and are continually crafted by Rapid7’s global security analysts and threat...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises accelerate and bolster their security capabilities as they move toward a more agile and mature security model, so they can contend with a rapidly evolving security threat landscape.

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security.

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
NEWS
Transavia keeps business flying with One Identity

Dutch airline reduces provisioning time for large, seasonal workforce.

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More
Unisys appoints Mathew Newfield as Chief Information Security Officer

Former IBM security leader brings wealth of experience working in both internal and client-facing...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More

Videos

Antti “Jogi” Poikola newly appointed Managing Director of the Finnish Data Center Association (FDCA), explains how Finland has an exceptional opportunity to become a leading country in sustainable digital...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...
In this conversation, Sam Lambert, EMEA Channel Director at Gigamon, and Richard Betts, Founder and CEO of Vizst Technology, share candid insights into how AI is reshaping security operations. They explore...

Expert Opinions

By Ben Matthews, Senior Director of Engineering at Stack Overflow.
By Russell Gammon, Chief Innovation Officer at Tax Systems.
By Sam Manjarres, Director of Product Marketing at WatchGuard Technologies.