Logo
NEWS
Censornet launches integrated IDaaS to enhance identity-aware, context-based security
  • Published in

Tight integration of IDaaS into Censornet’s platform elevates its autonomous security capability and gives organisations intelligent affordable control of authentication.

Read More
NEWS
40 per cent of companies believe their cyber strategy will be outdated in under two years
  • Published in

A perfect storm of escalating cyber-attacks and global tech innovation, leaves 61 per cent of Chief Information Security Officers (CISO) only “fairly confident” of managing their current threat exposure.

Read More
NEWS
Tanium unveils free comprehensive risk assessment
  • Published in

Enables organisations to compare their risk posture against industry peers.

Read More
NEWS
ExtraHop forms pan-EMEA distribution agreement with Exclusive Networks
  • Published in

ExtraHop has formed a landmark pan-European distribution agreement with Exclusive Networks, a specialist IT security distributor. Building on an initial 2020 partnership agreement, the pan-EMEA deal will expand distribution of Extrahop’s entire product portfolio to fourteen European territories.

Read More
NEWS
Fortinet introduces self-learning AI capabilities

FortiNDR leverages machine learning and deep neural networks – the next-generation of AI – to...

Read More
NEWS
Cloud-based digital forensics

The West Midlands Police are the first force to deploy Exterro's cloud-based digital forensics...

Read More
NEWS
Accidental data loss over email - a major risk?

New report from Tessian and the Ponemon Institute reveals that email has become the riskiest...

Read More
NEWS
Energy executives expect more extreme cyber-attacks

Energy professionals believe that cyber-attacks on the industry are likely to cause harm to life,...

Read More
NEWS
Majority make ransomware payments - a third unable to recover data

Veeam unveils the results of its 2022 Ransomware Trends Report at VeeamON 2022, finds that cyber...

Read More
NEWS
ThreatQuotient selected By Comcast to support cybersecurity operations

ThreatQ Platform and ThreatQ Investigations will be used by telecom conglomerate Comcast, parent of...

Read More
NEWS
Westcon-Comstor launches own flexible payment solutions to drive partner success

Flexible options, funded directly by the specialist distributor, will help partners easily...

Read More
NEWS
The Nuvias Group appointed for Armis across UK and DACH

Nuvias partners gain access to the entire Armis portfolio, addressing the considerable asset...

Read More
NEWS
Hybrid cloud dominates

Data from more than 1,300 global respondents combined with expert analysis to reveal goals,...

Read More
NEWS
Majority of UK businesses experience up to five security incidents a year

Infoblox unveils a global report examining the state of security concerns, costs, and remedies.

Read More
NEWS
DR called upon following cyberattacks

Zerto, a Hewlett Packard Enterprise company, commissioned IDC to conduct a major ransomware and...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Manvinder Singh, VP of Product Management for AI at Redis.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
Operational sustainability in the data centre industry is increasingly dependent on infrastructure that can evolve without disruption, such as cooling pipework systems that can be easily maintained or rerouted...