Logo
Open Threat Exchange update
  • Published in

AlienVault has introduced a new, enhanced version of Open Threat Exchange™ (OTX), its open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. Both OTX and the AlienVault Unified Security Management (USM) platform will be...

Read More
Making intelligence driven security a reality
  • Published in

ThreatStream has changed the company name to Anomali and launched two new products.

Read More
Fortinet launches Cyber Threat Assessment Program
  • Published in

Analysis of enterprises piloting the program shows that social media and application control demand great vigilance, while banks are favorite targets.

Read More
Cross-Cloud visibility and data protection
  • Published in

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance controls and encryption across a wide range of applications through cloud APIs.

Read More
Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against...

Read More
Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications,...

Read More
Harrowells Solicitors selects SMS PASSCODE to secure remote working

Harrowells Solicitors, the Yorkshire-based law firm, is working with Danish authentication...

Read More
Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security...

Read More
ServiceNow reinvents security response

ServiceNow is extending its industry-leading automation and orchestration expertise to transform...

Read More
85% of enterprises keeping sensitive data in the Cloud

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More
Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks...

Read More
Insurance a critical component of cyber defence strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to...

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More

Videos

In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

Global Commissioning’s CEO Louis Charlton’s latest article comes during National Apprenticeship Week, as the importance of building up our next generation of talent’s skills for data centre facilities is...
By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.