Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the combined Bit9 and Carbon Black real-time endpoint and server security solution with Check Point’s next-generation firewall and threat emulation offerings.

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More
Bit9 and Carbon Black merge

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More
If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and...

Read More
NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...

Read More
Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...

Read More
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...

Read More
Security concerns holding back data centre consolidation and Cloud migration

Security concerns are preventing businesses from unlocking the potential benefits of data centre...

Read More
Driven by end-user digital demand, Capgemini consolidates digital expertise in new global service line

Consolidation of three year industry research program with MIT Center for Digital Business and...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.
By Markus Nispel, Head of AI Engineering & EMEA CTO, Extreme Networks.
By Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres.