NEC establishes security operations centre in Austria
  • Published in

NEC Corporation and Infosec Corporation, a specialized security company belonging to the NEC Group, have announced the establishment of Infosec Austria GmbH as a Security Operations Center (SOC) in Vienna, Austria. The new company is a wholly owned subsidiary of Infosec Corporation.

Read More
NEWS
Echoworx reacts to security fears over Brexit with AWS installation in Dublin
  • Published in

Encryption provider offers customers relief from IP Bill legislation with new jurisdictional security strategy .

Read More
Managed access for Geneva
  • Published in

Lieberman Software Corporation and Balabit have implemented their  joint solution at the Direction G?n?rale des Syst?mes d’Informations (DGSI), a division of the Security and Economics Department of the State of Geneva. The solution leverages the companies’ industry leading...

Read More
Check Point releases cyber-security predictions for 2017
  • Published in

Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in connected and mobile devices will add to the complexity of IT security in 2017.

Read More
Red Hat achieves Common Criteria Security Certification for Red Hat Enterprise Linux 7

The world’s leading enterprise Linux platform is the first operating system with support for...

Read More
NEWS
Unhealthy report for medical records security

McAfee Labs finds stolen medical records available for sale from $0.03 to $2.42 per record.

Read More
45% of consumers have been a victim of cybercrime

One in six consumers globally lost money with 20% of victims losing more than ?1,000.

Read More
Symantec integrates Blue Coat Threat Intelligence into its Global Intelligence Network

Combining threat data results in 500,000 additional attacks being blocked for Symantec customers...

Read More
Simplifying security and policy management

Brocade has introduced Ruckus Cloudpath™ ES 5.0 software. The new release builds on previous...

Read More
Common enterprise IoT devices are hackable in under three minutes

In-depth analysis highlights the dangers posed by enterprise IoT devices, discovering that most...

Read More
LogRhythm announces global resale partnership

LogRhythm has formed a worldwide resale partnership with Dell EMC.

Read More
ThreatConnect and Symantec collaborate

ThreatConnect now utilises Symantec DeepSight Advanced IP and URL reputation feeds.

Read More
NEWS
FireMon acquires FortyCloud for multi-cloud management

Innovation streak continues with new Intelligent Security Management solutions for the cloud.

Read More
Centrify bolsters MFA Everywhere initiative

Centrify’s Multi-Factor Authentication solution now supports additional operating systems and...

Read More
NEWS
Luxembourg to become a Cyber Security hub

More proactive use of more sophisticated anti hacking tools against among the latest Cyber...

Read More

Videos

Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Andy Venables, CEO at POPX, discusses the findings of a new survey of 250 MSP leaders by POPX, which reveals a significant shift in expectations for MSPs in 2026. Unsurprisingly, security and AI featured...

Expert Opinions

AI’s true value starts with the right mindset. By Darin Patterson, VP of Market Strategy Make.
By Richard Mitchell, Head of Channel, ThreatAware
By Andre Jay, Director of Technology at Warp Technologies.
By Dael Williamson, EMEA CTO, Databricks.