Logo
NEWS
The labyrinth of clues
  • Published in

Costin finds an IP address in Sweden, so he calls David, who is based in Stockholm, to ask him to further investigate this. According to the investigation, the attackers don't seem to be from Sweden but only trying to confuse the researchers and avoid being discovered.

Watch Online
NEWS
Five Enterprise Cybersecurity Trends You Need to Know
  • Published in

Are businesses losing the fight against cyberattacks? How can businesses change the cybersecurity paradigm?

Watch Online
NEWS
How to Embrace Risk to Drive Innovation
  • Published in

Watch as RSA's Steve Schlarman talks with Tamara McCleary about the new risks created through digital transformation and how organizations can manage them in order to drive innovation.

Watch Online
NEWS
Customer Spotlight: SkiStar
  • Published in

A leading Alpine resort operator in Scandinavia and the Alps, Stockholm-based SkiStar is focused on creating a memorable mountain experience for every guest. From finding the ideal holiday package to buying digital lift tickets and sports gear, nearly every aspect of SkiStar's business relies on its network. "Our entire business depends on the network. It handles payments on the e-commerce side as well as payments from on-site ticket sales, hotels and retail transactions. We also issue our ski tickets with an RFID tag that must be validated at all points of entry and at the lifts in our resorts. If our network is corrupted by a cyberattack, it would disrupt revenue streams and create a very bad impression on our guests," said Peter Larsson, SkiStar’s CIO/IT chief.

Watch Online
NEWS
5 Enterprise Cybersecurity Trends You Need to Know
  • Published in

Are businesses losing the fight against cyberattacks? How can businesses change the cybersecurity paradigm?

Watch Online
NEWS
Tackling Cyber threats in Retail
  • Published in

Our experts discuss the cyber threats facing the Retail industry and how you can get a better view of the threats your business faces.

Watch Online
NEWS
Report: Securing the Cloud, Mobile and IoT
  • Published in

Threat actors are able to keep one step ahead by targeting the weakest points in an organization’s IT infrastructure – the cloud, mobile and IoT.

Watch Online
NEWS
What is a CASB?
  • Published in

What is a Cloud Access Security Broker (CASB)? This is the question many IT security teams are asking as they prepare to secure cloud applications like Office 365, Salesforce, and AWS.

Watch Online
NEWS
MSPs Share Their Thoughts on AI/Machine Learning
  • Published in

As these MSPs will attest, artificial intelligence and machine learning are important to helping them solve the challenge of delivering security services to an SMB market that is overconfident when it comes to cybersecurity preparedness. Their words exemplify the value MSPs are gaining when attending Webroot Forums across the nation.

Watch Online
NEWS
Customer Spotlight: Temple University
  • Published in

Temple University was founded in 1884 and is a R1 research institution with over 39,000 students. On a normal day Temple University has over 75,000 devices connected to their network. As a higher-ed institution, Temple needs to operate using an open network environment while protecting and securing their student’s data and research information.

Watch Online
NEWS
Kaspersky Security Network data processing in Zurich
  • Published in

In November 2018, Kaspersky Lab started to process malicious and suspicious files shared by users of Kaspersky Lab products in Europe in Zurich, Switzerland. The data, which users have actively chosen to share with Kaspersky Lab, includes suspicious or previously unknown malicious files and corresponding meta-data that the company’s products send to Kaspersky Security Network (KSN) for automated malware analysis.

Watch Online
NEWS
Preventing and filtering DDoS attacks
  • Published in

Fasternet, a leading Service Provider in Brazil, leverages A10 Thunder CGN to solve their lack of IP addresses, and looks to Thunder TPS as a DDoS solution to prevent and filter attacks. Partnering with A10 to build a robust, scalable network, and deliver the best experience possible to their customers.

Watch Online
NEWS
Making Sense of Identity Risk in 2019
  • Published in

Identity remains one of the most vulnerable attack vectors. What's ahead for 2019? Watch as Jim Ducharme offers a perspective on what trends and challenges will arise in the IAM market in the new year.

Watch Online
NEWS
Machine learning vs ICS cyberattacks
  • Published in

The talk about machine learning and ICS cyberattacks by Boris Savkov from Rostelecom on Industrial Cybersecurity Conference 2019.

Watch Online
NEWS
F5 Labs 2018 Phishing & Fraud Report
  • Published in

A preview of F5 Labs 2018 Phishing & Fraud Report.

Watch Online

News

Hammer Distribution has formed a new strategic partnership with Stormshield. Under this agreement, Hammer will serve as a key distributor for Stormshield’s comprehensive range of Next-Generation Firewalls...
Real estate investor Castleforge, in partnership with full-service data centre operator and advisory firm Galaxy Data Centers, announces that full planning consent has been granted for a new 15MW data centre...
WatchGuard® Technologies says that it has redefined how managed service providers (MSPs) deliver security at scale with the launch of Rai™. Unveiled at the company’s EMEA Impact Partner Conference, Rai is...
12th September 2026 marks the second year of the awareness day, created to help recognise the role data centres play in powering the UK's digital economy and the countries AI ambitions.

Expert Opinions

By Eileen Haggerty, area vice president, product & solutions at NETSCOUT.
By Inna Weiner, VP of Product, Data & AI, AppsFlyer.
At Atlassian Team '26 in Anaheim, industry leaders gathered to explore the next phase of AI, where context-aware systems and platform enhancements are set to redefine how work is automated and scaled across...
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.