Logo
Janrain partners with Akamai
  • Published in

Janrain and Akamai Technologies have partnered to provide Janrain Secure Edge, bringing new integrated security capabilities to the Janrain Identity Cloud®, the world’s largest identity network.

Read More
GDPR compliance achieved by just 20% of businesses
  • Published in

New research on GDPR compliance status, budgets and plans reveals majority of companies still working to achieve compliance.

Read More
Cryptominers and Cloud - the security 'sweetspots'
  • Published in

Check Point’s “Cyber Attack Trends: 2018 Mid-Year Report” reveals 42% of organizations globally hit by cryptomining attacks, while sophisticated Gen V attacks on cloud infrastructures grow.

Read More
Datacenter One secures customer data with ADVA ConnectGuard encryption
  • Published in

ADVA FSP 3000 with Layer 1 protection delivers robust security in financial network.

Read More
One in five businesses don't have precautions in place to protect their digital network

The news is saturated with reports on network hackings and all things GDPR, and it’s more...

Read More
Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and...

Read More
Cloudian and Storage Made Easy launch GDPR-ready file sync-and-share solution

Ensures compliance by controlling user data location and access, while monitoring for use of...

Read More
InAuth unveils next generation of fraud fighting tools

InAuth has enhanced its InExchange® solution, a global digital intelligence network, to provide...

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers...

Read More
NEWS
Half of businesses ignore future cyber threats

More than half of businesses (51 per cent) are focused on today’s cyber threats at the expense of...

Read More
Building risk awareness and aligning with business strategy are top priorities

MetricStream’s latest survey on the state of internal audit finds auditors focused on...

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...

Read More
New Aeriandi survey reveals voice is the silent cyber security threat

72 percent believe advances in voice technology pose a significant threat to enterprise...

Read More
NEWS
SonicWall raises alarm on encrypted threats and chip-based attacks

Company publishes mid-year update of 2018 SonicWall Cyber Threat Report, finds more than 5.99...

Read More
Use of banking Trojans up 50%

Check Point’s latest Global Threat Index for June 2018 shows that the global impact of...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
DCW Asia 2025 - Part 3 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Derek Thompson, Senior VP & GM, EMEA, Workato.
By CEO of Global Commissioning, Louis Charlton
By Chris Ackerson, SVP of Product at AlphaSense.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.