No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the...

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide...

Read More
Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber...

Read More
Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more...

Read More
Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash...

Read More
Hunt for attacks in real-time

See what attacks are hiding in your network traffic with our Cloud or on-premise assessments.

Read More
Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More
SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More
77 percent of executives ‘confident’ in basic security controls

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...

Read More
Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web...

Read More
Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...

Read More
Zycko and ObserveIT announce distribution partnership

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...

Read More
IT leaders taking wrong approach to accommodate shadow IT, says Talon Storage

Shadow IT threatens enterprise security as CIOs turn a blind eye.

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
DCW Asia 2025 - Part 2 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Chris Ackerson, SVP of Product at AlphaSense.
By Terry Storrar, managing director, Leaseweb UK.
By Cindy Ryborz, Marketing Manager EMEA, Corning Optical Communications.