Logo
NEWS
Tenable launches Tenable Enclave Security
  • Published in

New solution enables discovery, assessment and analysis of IT assets and containers to prevent breaches.

Read More
NEWS
IGEL for Business Continuity works in minutes, keeps business moving
  • Published in

New IGEL innovation is critical amid the growing, costly cyberattacks that target endpoints.

Read More
NEWS
83% of organisations use AI to generate code, despite mounting security concerns
  • Published in

Venafi has released a new research report, Organizations Struggle to Secure AI-Generated and Open Source Code. The report explores the risks of AI-generated and open source code and the challenges of securing it amidst hyper-charged development environments.

Read More
NEWS
Threat landscape intensifies
  • Published in

Technology companies drastically trail other industries in overall security posture.

Read More
NEWS
Security incidents for large enterprises on the increase

30% of attacked enterprises estimated their financial damage from cyber threats to be at least...

Read More
NEWS
UK organisations risk rise in ransomware

Overestimating abilities in recovery and readiness to pay ransoms are causing a surge in business...

Read More
NEWS
Veritas makes cyber recovery 'Simpler, Smarter and Faster'

New AI-powered, user-centric cyber resilience capabilities remove guesswork during recovery.

Read More
NEWS
Nokia and NL-ix deploy Deepfield

Largest IXP-based anti-DDoS protection for enterprises across Europe.

Read More
NEWS
Cohesity expands partnership with CrowdStrike

Cohesity has expanded its strategic partnership with CrowdStrike to strengthen threat detection and...

Read More
NEWS
Half of IT decision makers have had to recover data from a backup

Processes improving with a surge in automated backups to central and personal repositories.

Read More
NEWS
Logpoint and G’Secure Labs partner

The new partnership between Logpoint and G’Secure Labs (A Gateway Group Company) aims to help...

Read More
NEWS
Horizon3.ai enhances penetration testing with integrated threat detection

NodeZero Tripwires: Vulnerabilities are identified during a simulated attack, and digital tripwires...

Read More
NEWS
Preparedness pays off

Commvault has released new critical insights from its 2024 Cyber Recovery Readiness Report. This...

Read More
NEWS
Proofpoint and CyberArk expand strategic partnership

Cybersecurity leaders deliver integrated solutions to thwart phishing attempts across all channels...

Read More
NEWS
A proactive approach to threat detection

Arrow Electronics launches scalable managed Micro-SOC service.

Read More

Videos

DCW Asia 2025 - Part 2 of 3
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCW Asia 2025 - Part 3 of 3

Expert Opinions

By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.