Logo
NEWS
Financial institutions fail to protect mobile apps
  • Published in

Research highlights a systemic failure to protect financial services apps against multiple vulnerabilities.

Read More
NEWS
Organisations failing to meet basic level of PAM maturity
  • Published in

Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate data from more than 450 organizations across the globe that participated in Thycotic’s Q4 2018 PAM Maturity Model assessment survey to-date.

Read More
NEWS
Shadow mining mustn't be overlooked
  • Published in

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More
NEWS
Identity Engine promises 'building blocks for every identity experience
  • Published in

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now possible.

Read More
NEWS
Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More
NEWS
Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data...

Read More
NEWS
Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across...

Read More
NEWS
IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More
NEWS
Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes...

Read More
NEWS
ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More
NEWS
Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and...

Read More
NEWS
Carbonite closes acquisition of Webroot

Transaction combines data backup and recovery technology with cybersecurity platform to deliver...

Read More
NEWS
Beware the backdoor

69% of security professionals believe countries with government mandated encryption backdoors...

Read More
NEWS
Swivel Secure partners with BeSecure IT

Multi-factor authentication provider, Swivel Secure, has announced its new partnership with...

Read More
NEWS
Coleg Cambria chooses LogRhythm’s NextGen SIEM Platform to centralise security operations

LogRhythm’s platform to optimise and simplify security workflows at UK education provider.

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
DCW Asia 2025 - Part 2 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Mala Pillutla, Vice President of Sales for Log Management, Dynatrace.