Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured...

Read More
Tenable Network Security raises $250 million

Series B funding led by Insight Venture Partners and Accel will help accelerate development of the...

Read More
UK’s leading conveyancer chooses Databarracks for disaster recovery

myhomemove selects Databarracks to implement DRaaS offering.

Read More
Omada & Balabit partner

Omada and Balabit each provide unique innovative solutions within IT Security and Compliance. ...

Read More
NEWS
Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated...

Read More
NEWS
Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member...

Read More
The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key...

Read More
87% of IT professionals disagree with UK governments’ efforts to limit encryption

Tech community reacts to the government’s new Investigatory Powers Bill, which bans the use of...

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications