Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured...

Read More
Tenable Network Security raises $250 million

Series B funding led by Insight Venture Partners and Accel will help accelerate development of the...

Read More
UK’s leading conveyancer chooses Databarracks for disaster recovery

myhomemove selects Databarracks to implement DRaaS offering.

Read More
Omada & Balabit partner

Omada and Balabit each provide unique innovative solutions within IT Security and Compliance. ...

Read More
NEWS
Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated...

Read More
NEWS
Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member...

Read More
The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key...

Read More
87% of IT professionals disagree with UK governments’ efforts to limit encryption

Tech community reacts to the government’s new Investigatory Powers Bill, which bans the use of...

Read More

Videos

Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

In this opinion piece, Nigel Mallon, Business Development Manager for Data Centres at Weatherite, explores how heat recovery is transforming data centre efficiency. As energy demands rise, harnessing waste...
By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
By Eric Herzog, CMO at Infinidat.