Lidera Network signs agreement with Cylance

Cylance and Lidera Network to offer a revolutionary cybersecurity solution that protects endpoints against advanced persistent threats and malware with extremely high efficacy.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
Informatica Axon 'transforms' enterprise data governance

Informatica has introduced Informatica Axon, said to be the industry’s first fully integrated, enterprise data governance solution.

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as...

Read More
Ransomware threat doubles

Check Point’s H2 2016 Global Threat Intelligence Trends Report, highlights key trends in network...

Read More
Business demand for data erasure up by 466%

Lots of businesses still unaware of the impact ‘right to be forgotten’ will have.

Read More
NEWS
2016: a year of ransomware in spam

According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam...

Read More
Cybersecurity certification first to address behavioural analytics

CompTIA Cybersecurity Analyst (CSA+) becomes first training tool incorporating in-depth...

Read More
NEWS
Growing security, and compliance challenges in face of increasing cloud services adoption

The average company runs 464 custom applications; and more than 70 percent of these are...

Read More
40 per cent of accounts are hacked by simply guessing user passwords

Kaspersky Lab launches new password manager to help secure passwords.

Read More
European companies are 'too slack' in preventing cybercrime

Cybersecurity threat list for 2017 from Fujitsu Security Operations Center highlights critical...

Read More
Only three percent of businesses equipped to meet security attacks

New study from Tripwire reveals that most organizations are seriously lacking in both skills...

Read More
Geopolitical changes drive data privacy concerns

Only 29% of respondents say they have high levels of confidence in their organizations’ ability...

Read More
Google security support

nShield HSM “bring your own key” now available for Google customers supplying keys.

Read More

Videos

In this interview, Melanie Douglas, Sales Manager EMEA & Global Partner Program Manager, discusses how the company is evolving its Microsoft 365 migration expertise into AI readiness, governance, and Copilot...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist.
This article is based on an exclusive interview with Steve Wilson, Chief AI Officer at Exabeam, exploring how the rise of the digital workforce is reshaping cybersecurity. The discussion covers the shift from...
By JP Buzzell, chief data centre architect at Eaton.
By Fabrizio Landini, Global Data Centre Segment Leader, Hitachi Group.