Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as a Service (IaaS) initiative. In addition, the SDP working group is hosting its fourth Hackathon throughout the RSA Conference, with a top prize of $10,000 available to the first participant to...

Read More
Improving incident response effectiveness

CyberArk has introduced new real-time threat detection and containment capabilities to help organisations secure against cyber attacks targeting Microsoft Active Directory infrastructure. Compromising Active Directory empowers attackers to take control of the business.

Read More
BT and Intel Security collaborate to develop next generation security services

BT and Intel Security have formed a strategic agreement to create new solutions to help organisations improve security and prevent cyber-attacks. The companies will also work together in a joint cyber partnership to further develop their common vision of creating next generation security...

Read More
Tenable Network Security launches Technology Integration Partner Program

Tenable levels-up its global technology integrations program with launch partners Amazon Web Services, CyberArk, FireEye and Gigamon to speed innovation and deliver holistic security to customers.

Read More
10 Networks launches standalone Thunder SSL Insight (SSLi) line of products

A10 Networks has launched the Thunder SSL Insight (SSLi), a standalone security product built on...

Read More
Check Point unveils management platform

New R80 security platform helps organizations to better consolidate processes, policies and...

Read More
Immune system fights back

Darktrace has launched Darktrace Antigena, a ground-breaking new product that uses machine...

Read More
NEWS
Turning security intelligence into protection

Companies need more than endpoint protection to stay secure in an increasingly complex...

Read More
Privileged security

Bomgar Vault helps companies secure, manage, and administer shared credentials for privileged users...

Read More
IoT encryption and authentication

Cryptosoft to leverage Symantec’s Roots of Trust and device certificates to secure IoT devices.

Read More
Advancing sandboxing beyond threat detection

Industry-first, multi-engine approach to advanced threat analysis—that also supports...

Read More
Ensuring email security and compliance

Fidelis email security for Office 365 ensures email security and compliance with improved...

Read More
How well does your business or organisation look after customers’ personal information?

Data breaches, cyber security, identity theft - recently the news has been full of stories...

Read More
Open Threat Exchange update

AlienVault has introduced a new, enhanced version of Open Threat Exchange™ (OTX), its open...

Read More
Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

Read More

Videos

As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...

Expert Opinions

Why water quality has become a defining variable in AI-era data center commissioning By Jacob Paugh, Senior Director of Global High Tech at ChemTreat.
Tom Salmon, group business development manager for data centres at SPP Pumps, explores the scale of the pumping requirements at data centres, arguing that turnkey suppliers and pre-integrated systems can help...
Researchers developed a system that intelligently balances workloads to improve the efficiency of flash storage hardware in a data center.