McAfee introduces advanced security for Amazon web services
  • Published in

Test drive simulates real-world attack use cases, configure policy and review reporting dashboards.

Read More
How advanced targeted attacks evolved in Q2, 2017
  • Published in

The second quarter of 2017 saw sophisticated threat actors unleash a wealth of new and enhanced malicious tools, including three zero-day exploits and two unprecedented attacks: WannaCry and ExPetr. Expert analysis of the last two suggests the code may have escaped into the wild before it...

Read More
'Frictionless' security
  • Published in

One Identity Safeguard 2.0 is first in the industry to offer “Approval Anywhere,” a cloud-based approval workflow that enables security professionals to approve password requests from any device.

Read More
Information security challenges holding back innovation in the financial services sector
  • Published in

New research reveals that information security is the most common challenge facing IT departments in the financial services sector, with almost 6 out of 10 seeing it as a primary point of concern.

Read More
Lack of visibility as a leading obstacle to securing enterprise and hybrid cloud networks

Sixty-one percent of IT decision-makers in the U.K. cite blind spots as a major obstacle to data...

Read More
Fuzz tests focus on IoT and industrial vulnerabilities

Synopsys has released its fuzzing report, which provides deep analysis on potential zero-day...

Read More
NEWS
Cyber attacks occurring more frequently and with greater sophistication

The frequency and sophistication of cyber attacks continues to rise globally according to...

Read More
ANSecurity helps healthcare organisations across Lincolnshire save over ?100,000 annually

Shared service model improves security and accessibility while dramatically reducing licencing...

Read More
NTT Security strengthens senior management team in EMEA

NTT Security, the specialised security company of NTT Group, has announced changes to its ...

Read More
Steganography - the next big security threat?

While analysing multiple cyberespionage and cybercriminal campaigns, Kaspersky Lab researchers...

Read More
NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware...

Read More
NEWS
Data loss is the major Cloud concern

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017...

Read More
PAM platform available on Google Cloud

Broad cloud support is a BeyondTrust priority, having the only complete PAM platform available on...

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access...

Read More

Videos

Lizzy McDowell, Director of Marketing at Kao Data, discusses the launch of the company’s Critical Careers: Celebrating Women in Digital Infrastructure – a new campaign highlighting the stories,...
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how storage can improve an enterprise’s environmental footprint.
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

By Scott McKinnon, Chief Security Officer, UK&I at Palo Alto Networks.
By Carl Windsor, Chief Information Security Officer, Fortinet.
By Frank Jones, CEO, IMS Evolve.
By Myles Leach, Managing Director NFON.