Unifying security enforcement across the entire enterprise
  • Published in

Juniper Networks has introduced enhancements to its Software-Defined Secure Networks (SDSN) platform to deliver pervasive security across multi-vendor environments, public clouds and private clouds. Powered by automated enforcement, real-time intelligence and machine learning, SDSN knows...

Read More
iland achieves Cloud Security Alliance STAR Gold Certification
  • Published in

iland has achieved the Cloud Security Alliance (CSA) STAR Certification, becoming only the second public cloud service provider (CSP) to hold this gold rating.

Read More
Processing the rising tide of encrypted internet traffic
  • Published in

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations overcome the challenges of providing advanced SSL decryption and encryption for both application acceleration and security visibility.

Read More
NEWS
Attacks focus on people as well as their technology
  • Published in

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More
Trojan Horse warning

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt...

Read More
Kaspersky launches Security Cloud

Every person is unique and, just like their fingerprints, everyone’s digital life is...

Read More
Patches far from perfect

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from...

Read More
Vectra collaborates with VMware

Delivering visibility into hidden cyber attacker behaviours throughout virtualised environments.

Read More
Deloitte and LogRhythm join forces to provide advanced cyber security solutions

Deloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly...

Read More
Software AG unveils GDPR Framework

Provides critical capabilities and solid foundation for GDPR compliance.

Read More
Number of fines for UK data privacy issues doubles and totals ?3.2m

The UK was one of the most active regions for regulatory enforcement action in Europe last year,...

Read More
NEWS
Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals...

Read More
East Sussex Healthcare NHS Trust upgrades secure access to reduce costs and complexity

Multi-vendor solution delivers self-service tools and simplified two factor authentication while...

Read More
BeyondTrust supports Microsoft Azure

PowerBroker Privileged Access Management and Retina Vulnerability Management solutions now...

Read More
IT & telecoms firms risk damaging fines

Almost half (44%) of IT & telecoms companies are unaware of the new wide-ranging data...

Read More

Videos

Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Andreas Keiger, Chief Revenue Officer at ZutaCore, discusses the AI power density challenge facing data centre owners and operators, looking at the various liquid cooling options available to address the...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...

Expert Opinions

New report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta - but substantial score improvements for users applying...
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By Carl Windsor, Chief Information Security Officer, Fortinet.