Logo
NEWS
Veeam and Sophos unite
  • Published in

Veeam and Sophos technologies integrate to vigilantly detect cybersecurity threats like ransomware, determine the warranted response, and quickly recover impacted data by exchanging critical information.

Read More
NEWS
CybExer Technologies launches channel partner programme
  • Published in

Soliton Systems and CybExer to enhance cybersecurity services in Japan.

Read More
NEWS
Semperis and Veritas to protect against Active Directory attacks
  • Published in

Semperis has formed a global relationship with Veritas Technologies to protect enterprises’ most critical assets and identity systems from cyberattacks. The powerful combination of Semperis Active Directory Forest Recovery (ADFR) and Veritas NetBackup provides enterprises with a comprehensive...

Read More
NEWS
CyberCX launches updated Ransomware and Cyber Extortion Best Practice Guide
  • Published in

CyberCX has launched its new Ransomware and Cyber Extortion Best Practice Guide, reflecting significant changes to the global cyber security landscape as businesses, organisations, and governments continue to grapple with established and emerging cyber threats.

Read More
NEWS
LogRhythm named as Official Cybersecurity Solution Provider to Romanian government agencies

Romanian governments gain access to LogRhythm SIEM to protect the country and its citizens from the...

Read More
NEWS
More than half of senior security professionals impacted by burnout

59% of UK senior cyber security professionals feel burnout at work has impacted their ability to do...

Read More
NEWS
Regulation responsibility is unclear claim CISOs

A third of CISOs agree that managing regulation is an ongoing challenge in their organisation, with...

Read More
NEWS
Keeper Security begins relationship with Ingram Micro

Distributor agreement addresses the growing impact of cybercrime on businesses across Europe.

Read More
NEWS
Quantifying the identity threat: a fifth of authentication requests are malicious

F5 Labs research finds 19.4% of authentication requests are likely driven by credential stuffing...

Read More
NEWS
OVHcloud sets to roll out Identity and Access Management

OVHcloud announces its latest security defining feature with advanced Identity and Access...

Read More
NEWS
Poor CEO grasp of threats and critical need for investment

Major increase in cyberattacks from deep fake AI technologies expected… but leaders lack both...

Read More
NEWS
SailPoint closes Osirium acquisition

Transaction feeds into company’s vision for unified identity security for the modern enterprise.

Read More
NEWS
48% of cyberattacks breach UK organisations’ defences

Security teams are so busy remediating cyberattacks that they don’t have time or resources to...

Read More
NEWS
BATM receives $3m cyber security order

BATM Advanced Communications has received a new cyber security order, with a value of $3m. The...

Read More
NEWS
Over half of UK IT leaders refused to work with a software vendor with poor security credentials

Almost all (92%) of IT decision makers cite email security as their main concern, with phishing...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By CEO of Global Commissioning, Louis Charlton
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.