NEWS
Security scheme could protect sensitive data during cloud computation
  • Published in

MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.

Read More
NEWS
Rapid growth of machine identities - cause for concern
  • Published in

CyberArk has released its 2025 State of Machine Identity Security Report, revealing that machine identity-related security incidents are on the rise, as the volume and complexity of machine identities continue to multiply.

Read More
NEWS
Juniper Networks boosts Saudi Telecom Company’s 5G security deployment
  • Published in

Strategic software upgrade drives sustainable business growth through improved user experiences, enhanced security performance and lower costs.

Read More
NEWS
Colt completes quantum secured encryption trial across optical network

Adtran, Ciena, IDQ, Nokia and Toshiba join forces with Colt in trial exploring new ways for global businesses to overcome risks to encryption posed by quantum computers.

Read More
NEWS
Radisson Hotel Group selects GTT for global SASE deployment

Hospitality leader bolsters network security and application performance for its hotel owners and...

Read More
NEWS
Ransomware attacks soar 82% in one year, with average payment up 400%

Businesses are facing an unprecedented threat from ransomware attacks, with downtime now averaging...

Read More
NEWS
Nokia strengthens Worldstream’s hosting security

Enterprise customers using hosting services will benefit from fast network-based mitigation of most...

Read More
NEWS
Cloudflare expands threat intelligence offering

Customers can tap into insights from Cloudflare’s global network – one of the largest in the...

Read More
NEWS
Brivo launches Unified Security Suite

Brivo has launched Brivo Security Suite. The unified platform simplifies security management by...

Read More
NEWS
Machine identities outnumber humans 40,000 to 1

Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of...

Read More
NEWS
WSO2 debuts AI-driven automation

The newest releases of WSO2 Identity Server, Asgardeo IDaaS, and Private Identity Cloud add...

Read More
NEWS
Mphasis and SecPod form strategic security partnership

Mphasis has formed a strategic partnership with SecPod a SaaS-based cybersecurity products and...

Read More
NEWS
OT/ICS cyber threats escalate

Dragos has released the Dragos 2025 OT/ICS Cybersecurity Report, our 8th Annual Year in Review, the...

Read More
NEWS
F5 unveils Converged Application Delivery and Security Platform

F5 Application Delivery and Security Platform converges high-performance traffic management and...

Read More
NEWS
Half of GRC professionals struggle to keep pace with changes to compliance requirements

New report from Drata shows the growing complexity of GRC and mixed sentiments on AI.

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.

Expert Opinions

By Peter Hardy, Partner, Eleanor Ruiz, Counsel, and Asélle Ibraimova, Counsel, at Reed Smith.
By Paul McHugh, Head of Sales EMEA at Ericsson Enterprise Wireless Solutions.