Arrow and Palo Alto Networks expand UK relationship
  • Published in

Arrow Electronics has extended its relationship with Palo Alto Networks, the next-generation security company, adding its offerings to the Arrow portfolio in the U.K., tapping into the market opportunity around private, hybrid and public cloud. This builds upon the existing Arrow and...

Read More
Expanded network intelligence
  • Published in

Leading communications service provider (CSP) uses Allot network intelligence solutions to enhance policy control and charging capabilities and maintain high quality of experience (QoE).

Read More
1 in 4 UK healthcare IT professionals aren’t confident in their organisation’s ability to respond to cyberattacks
  • Published in

New report examines whether the healthcare industry is prepared to combat evolving cyber threats.

Read More
Data security a major concern for businesses
  • Published in

A new piece of research commissioned by IT systems management provider Kaseya has revealed that attempting to secure data and privacy has proven to be one of the biggest challenges in 2017, as voted for by 44% of IT executives.

Read More
KrolLDiscovery opens ISO 27001-certified data centre in Ireland

KrolLDiscovery's new data centre commenced operations in Ireland on November 1.

Read More
NEWS
Coop employs Vectra Cognito to protect its retail operations from cyberattacks

Leading Swiss retail group uses Cognito artificial intelligence platform to reduce cyber risk.

Read More
Security compliance 'time bomb'

Line-of-business (LoB) leaders and IT are anxious about IoT/OT security due to concern about...

Read More
Validating end-to-end network security access for Cloud environments

Ixia has launched BreakingPoint Cloud, a SaaS solution that safely models data breaches and threat...

Read More
ThreatConnect now provides one place to visualise intelligence and operations

ThreatConnect Dashboards and other features in latest release allow customers to analyse all...

Read More
Widespread access mismanagement

Global survey of over 900 IT security professionals uncovers large-scale mismanagement of...

Read More
GDPR confusion

Businesses more concerned with security costs than meeting ‘State of the Art’ requirement.

Read More
DevOps and security teams must work together

CyberArk says that DevOps and security professionals have worrying knowledge gaps about where...

Read More
Subscription model for secure app services

A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises...

Read More
NEWS
Bromium helps London’s Metropolitan Police

Metropolitan Police Cybercrime Unit, FALCON, to use Bromium to conduct cyber forensics to identify...

Read More
NEWS
Passwords cause BYOD risk

Systems left exposed to the threat of compromised credentials, potentially resulting in...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...

Expert Opinions

By James Preston, Principal Security Consultant at ANSecurity.
By Giedrius Steimantas, Engineering Manager, Oxylabs
Infinidat says that Enecom, Inc., an information and communication technology (ICT) services provider primarily serving the Chugoku region in Japan, enhanced its storage infrastructure with multiple...
By Martin Schirmer, Group Vice President of NEMEA, Cloudera.