Cybersecurity certification program

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for customers, partners and employees of SecureAuth. Through eLearning and instructor-led courses, SecureAuth University offers certification for three levels of cybersecurity professionals:...

Read More
White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the cloud to data centre operators. The obvious benefits of maximum uptime with minimal overhead and improved efficiency are nevertheless offset by the threat of such systems being used as an avenue...

Read More
Only 8% of Asian nations are safe for data privacy

Only four Asian nations are considered truly secure for data storage, according to a new report by secure data centre Artmotion. Combining independent data from the United Nations, World Economic Forum, Transparency International and several other leading privacy groups, the report titled Data...

Read More
Now available: ThreatConnect powered by SAP HANA

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More
NEWS
Data theft rising sharply

Three out of every four organisations have been hit by the loss or theft of important data over...

Read More
DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to...

Read More
BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for...

Read More
CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically...

Read More
BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies,...

Read More
A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity...

Read More
Gigamon fortifies security analytics with certificate metadata

Gigamon’s metadata generation engine enables faster detection of attacks that leverage falsified...

Read More
Faster, more resilient vulnerability assessment

Tripwire has introduced that the most recent version of Tripwire® IP360TM now distributes...

Read More
Allot launches new security solution in collaboration with Intel Security

McAfee Unified Security Powered by Allot delivers comprehensive, yet simple, service that...

Read More
Tripwire launches Tripwire Enterprise 8.5 agent on Axon

New technology revolutionizes endpoint data collection for cyber security, compliance and IT...

Read More
Analysing ransomware behaviour

CyberArk has released new ransomware research from CyberArk Labs. More than 23,000 real-world...

Read More

Videos

Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
In this conversation, Bill Andrews, President and CEO of ExaGrid, discusses how Tiered Backup Storage is helping MSPs improve performance, strengthen ransomware protection, and scale efficiently. He explains...
In this conversation, Mike Anderson, Global Channels Director at EasyDMARC, explains why DMARC has shifted from an optional best practice to a critical requirement for modern organisations. He shares how...

Expert Opinions

By Brian O’Hare, Service Director at BCS Consultancy.
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.