Logo
Processing the rising tide of encrypted internet traffic
  • Published in

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations overcome the challenges of providing advanced SSL decryption and encryption for both application acceleration and security visibility.

Read More
NEWS
Attacks focus on people as well as their technology
  • Published in

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More
Trojan Horse warning
  • Published in

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt and distract network operators from more destructive security threats.

Read More
Kaspersky launches Security Cloud
  • Published in

Every person is unique and, just like their fingerprints, everyone’s digital life is different too. That’s why every Internet user needs a security solution that adapts to their online behavior – this was the rationale behind the release of Kaspersky Security Cloud. The new service...

Read More
Patches far from perfect

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from...

Read More
Vectra collaborates with VMware

Delivering visibility into hidden cyber attacker behaviours throughout virtualised environments.

Read More
Deloitte and LogRhythm join forces to provide advanced cyber security solutions

Deloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly...

Read More
Software AG unveils GDPR Framework

Provides critical capabilities and solid foundation for GDPR compliance.

Read More
Number of fines for UK data privacy issues doubles and totals ?3.2m

The UK was one of the most active regions for regulatory enforcement action in Europe last year,...

Read More
NEWS
Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals...

Read More
East Sussex Healthcare NHS Trust upgrades secure access to reduce costs and complexity

Multi-vendor solution delivers self-service tools and simplified two factor authentication while...

Read More
BeyondTrust supports Microsoft Azure

PowerBroker Privileged Access Management and Retina Vulnerability Management solutions now...

Read More
IT & telecoms firms risk damaging fines

Almost half (44%) of IT & telecoms companies are unaware of the new wide-ranging data...

Read More
NEWS
Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments,...

Read More
SonicWall appoints Michael Berg to lead Channel Program in Europe

Michael Berg has joined SonicWall as Senior Director of Channel Sales with a focus on Europe. As...

Read More

Videos

Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
Data Centre World 2026
Antoine Jebara, Co-Founder and GM of Channel & Alliances at JumpCloud, explores how managed service providers can move beyond transactional roles to become true business partners. He dives into practical...
Howard Pheby, newly appointed Chief Commercial Officer at Stellanor, explains how the company is building something different: urban colocation that serves enterprises where they actually operate, backed by...

Expert Opinions

By Sadiq Syed, SVP, Digital Buildings at Schneider Electric.
Harmonics pose a headache for electrical systems in many industries, but data centres are uniquely exposed to the risks. Scott Birchall, Data centres & HVACR application engineer, ABB, explains what harmonics...
By Peter Manta, AI Strategy and Practice Director, Informatica by Salesforce.