Logo
Cyber London reveals second cohort
  • Published in

Cyber London, Europe’s first dedicated cyber security start-up accelerator and incubator, has revealed the eight start-ups participating in Cyber London’s second programme.

Read More
Firms missing out with do-it-yourself approach to Threat Intelligence
  • Published in

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More
Top five biggest security predictions for the technology industry in 2016
  • Published in

Malware, Advanced Persistent Threats, and Linux ransomware are all set to plague businesses and consumers next year.

Read More
A 2015 top ten global hack attack list
  • Published in

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small...

Read More
ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat...

Read More
Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural...

Read More
NEWS
Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company...

Read More
A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives...

Read More
Kraynak joins Imperva

Mark Kraynak has been appointed Imperva’s Senior Vice President and General Manager of the...

Read More
AlienVault appoints Catherine Kelly as VP of EMEA Sales

Catherine Kelly has joined AlienVault as Vice President of Sales to expand its business...

Read More
Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet...

Read More
Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle...

Read More
PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More
Preventing data exfiltration in real time

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data...

Read More
Resilient Systems joins IBM Security App Exchange community

Resilient Systems Incident Response Platform is part of collaborative development to stay ahead of...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...

Expert Opinions

As data center construction across North America accelerates, projects are becoming larger, faster and more complex than ever before – and the consequences of getting fire safety wrong have never been...
By Kirsty Biddiscombe, EMEA Business Lead AI, ML & Data Analytics, NetApp.
By Richard Harbridge, Microsoft MVP and Technology & Ecosystem Strategist at ShareGate.
TES Power’s Operations Director, Martin Brannigan, discusses the challenges in talent shortage.