2015 predictions

  • Published in

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud predictions for 2015.

Read More

Protecting against DDoS attacks – how well prepared are Data Centres?

  • Published in

By Dave Larson, CTO and VP Product at Corero Network Security.

Read More

Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

How data security dominated the data recovery conversation in 2014

  • Published in

Data security, business continuity and mobile devices were among the biggest trends impacting the data recovery industry in 2014, according to year-end information from leading provider Kroll Ontrack. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.

Read More

New challenges and risk mitigation drive changes to IT security

  • Published in

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More

ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from customers, partners, and industry analysts and insiders, ExtraHop expects to see enterprises shift their focus from big suite vendors to new, best-of-breed solutions that scale to meet demand on performance, availability, and security.

Read More

Damballa, the advanced threat discovery company, has released customer research data that indicates...
Glasswall Solutions has released its latest research report “Keeping the Enterprise Secure: A...
As lockdown measures tighten once more in response to COVID cases, many organisations are being...
Venafi has published the results of a study conducted by Dimensional Research. The study...
By Philip Lieberman, President & CEO Lieberman Software.
Janrain and Akamai Technologies have partnered to provide Janrain Secure Edge, bringing new...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more