Gigamon and JDSU announce integration of Software Defined Visibility APIs

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s breakthrough innovation – Software Defined Visibility, a framework that allows customers, security and network equipment vendors, as well as managed service providers, to control and program...

Read More
Social media - the security risk
  • Published in

New study reveals that social media security is a low priority for organisations and employees are unaware of the risks

Read More
Integrated threat response and intelligence platform
  • Published in

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment time.

Read More
Tenable Network Security extends capabilities of Nessus Agents
  • Published in

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More
Setting the standard for secure managed file transfer analytics and reporting

Ipswitch has announced the release of Ipswitch Analytics, a new reporting and monitoring solution...

Read More
Rapid7 brings Strategic Security Advisory Services to EMEA 

Rapid7will offer its Strategic Advisory Services in EMEA to help security executives and teams...

Read More
NTT Communications to trial enhanced DDoS Defense Orchestrator System

Aims to become Japan's first telecom to provide multihomed anti-DDoS service.

Read More
Scandinavian bank in Lithuania chose Proact for the modernisation of its IT infrastructure

IT infrastructure is one of the key structural components of the bank. It faces continuously...

Read More
Bloxx moves real-time content filtering into the Cloud

Bloxx is to enter the Cloud market with the launch of Tru-View Cloud, a new cloud-based web...

Read More
Bromium enhances endpoint protection

Bromium hasannounced the general availability of Bromium Enterprise Controller (TM) (BEC), a...

Read More
Zero-day attacks pose the biggest threat

Check Point’s research of over 16,000 Security Gateways globally shows targeted attacks and...

Read More
Internet of Things spending to reach $1.7 trillion in 2020

The Internet of Things (IoT) continues to gain momentum as vendors and enterprises begin to embrace...

Read More

Videos

Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...

Expert Opinions

By Jon Fielding, Managing Director, EMEA, Apricorn.
By James Preston, Principal Security Consultant at ANSecurity.
By David Trossell, CEO and CTO of Bridgeworks.