Logo
50% surge in encrypted traffic
  • Published in

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
Gemalto releases findings of 2015 Breach Level Index
  • Published in

Theft of identities and personal information retains top spot, accounting for 53% of data breaches; healthcare and government overtake retail as most-targeted sectors.

Read More
prpl Foundation demonstrates security by separation for IoT and other connected embedded devices
  • Published in

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal foundation for securing Internet of Things (IoT) and other connected embedded devices.

Read More
Tools4ever introduces IDaaS Cloud solution: HelloID
  • Published in

HelloID combined with Tools4ever’s E-SSOM offers 100 percent single single-on.

Read More
Morgan Lewis expands Global eData Service offerings with EU data centre launch

eData team to host webinar on the current state of EU data privacy law and the firm’s new EU...

Read More
17 per cent of IT managers admit to hacking

Absolute® Software has published the results of a research report the company conducted among...

Read More
CensorNet acquires SMS PASSCODE

Acquisition will accelerate company’s global expansion and seize the market opportunity for a...

Read More
Tripwire debuts Online Security Application Exchange Platform

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More
Nexsan adds Web browser access

Nexsan says that its family of Transporter private cloud file sync and share...

Read More
NEWS
Borica-Bankservice selects Vormetric

Vormetric has published details of a new deployment of data encryption solutions for...

Read More
Firewall innovations

As global companies embrace new digital business opportunities, cybersecurity is regularly cited as...

Read More
Gemalto launches M2M Cat 1 LTE module

Gemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced...

Read More
NEWS
Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and...

Read More
IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
Tieto adds Finnish start-up CySec to Security Services ecosystem

Tieto's Security Services start-up is initiating collaboration with CySec Ice Wall Oy (CySec),...

Read More

Videos

Eva Diego, the new CEO of Hyphen, an international architectural practice working with many of the world’s leading brands and digital infrastructure developers, explains how global demand for critical...
Rob Bolton, CEO at n2s Bioscope, explains how n2s has formed a new three-year partnership with NTT DATA to support Virgin Media O2 across all UK data centre sites, focusing on responsible decommissioning,...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.
By Markus Nispel, Head of AI Engineering & EMEA CTO, Extreme Networks.