No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the...

Read More
Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More
Lancope appoints technology industry veteran Ben Todd as Sales Director for Europe

Todd brings 18 years of IT and security sales experience, including seven years with Cisco,to his...

Read More
Radware introduces cyber attack mitigation service

Radware offers an “always-on” hybrid DDoS attack mitigation service to help protect...

Read More
Agari and Palo Alto agree to threat intelligence data exchange

Agari has entered into an agreement with Palo Alto Networks, the leader in enterprise security.

Read More
CIOs still have their work cut out to keep up with the pace of innovation

Latest research suggests IT leaders are struggling to convince their colleagues that they can help...

Read More
Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More
Unifying physical and Cloud security

Unified security architecture is capable of being mapped, tested and measured; enables more...

Read More
ISMM accreditation for Azlan

Value-added distributor’s HP sales team achieves internationally-recognised qualification...

Read More
Top five tips for security behaviour management programs

By Scott Greaux, Vice President, Products and Services, PhishMe.

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service...

Read More
Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber...

Read More
Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more...

Read More

Videos

In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...
In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...
Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...

Expert Opinions

By Errol Bull, P.E., CSI, Application Development Leader at Momentive Performance Materials Inc. Member: IIBEC, ASTM C24, ISO TC59/SC8.
By Jorge Monteiro, CEO of Ethiack.
By Ben Matthews, Senior Director of Engineering at Stack Overflow.
By Dr Sebastian Weidt, co-founder & CEO, Universal Quantum.