Logo
NEWS
NTT reveals cybersecurity trends that will shape business technology in 2020
  • Published in

Security Orchestration, Automation and Response (SOAR) will rocket to address cyber attacks happening at machine speed.

Read More
NEWS
Dealing with data transfers
  • Published in

Equinix is the first company to have its Binding Corporate Rules approved under the new GDPR regime.

Read More
NEWS
Lack of IT security input in DevOps introduces cyber risk for 72% of companies
  • Published in

Global survey reveals organizations need tools that support DevOps security.

Read More
NEWS
Mind the cybersecurity skills gap
  • Published in

2019 Cybersecurity Workforce Study also examines motivations and career paths of cybersecurity professionals and shares recruitment strategies for organizations to use.

Read More
NEWS
IT security budget growth is slowing in UK businesses

After strong progress in recent years, organisations must ensure they continue to invest in cyber...

Read More
NEWS
Advanced threat detection and response services aimed at Azure

Trustwave has launched services to bolster threat monitoring, detection and response natively in...

Read More
NEWS
Cloud adoption on the rise, single sign-on needs to follow

Only 34% of companies authenticate users accessing cloud data via SSO.

Read More
NEWS
G+D Mobile Security collaborates with lowRISC to Ssupport OpenTitan

Companies’ aim is to make the hardware root more transparent, trustworthy, and secure for...

Read More
NEWS
Simplifying and integrating security

Cisco Security’s open and integrated platform approach is enhanced with new zero trust, cloud,...

Read More
NEWS
Zero Trust to replace VPNs?

Zero Trust Network Access ends VPN attacks and more than two-thirds of organisations are taking...

Read More
NEWS
Cyber threats to increase in 2020?

FireEye has released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs...

Read More
NEWS
Becrypt launches Secure Operating Centre service

Providing flexibility for outsourced security monitoring.

Read More
NEWS
Employees are not the weakest security link

Record-breaking 20 million active phishing Reporters and 100+ million phishing simulations inform...

Read More
NEWS
IoT attacks - more planning required

Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks,...

Read More
NEWS
Security practice is the biggest challenge for IT teams

Lack of Artificial Intelligence skills and a smart, connected approach to quality assurance impedes...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...

Expert Opinions

By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres.
By Haris Pylarinos, Founder and CEO of Hack The Box