NEWS
Privilege securty gap

Vectra research highlights need to continuously monitor account behaviours once access to a network has been granted.

Read More
NEWS
Cyber attacks, ransomware were unrelenting throughout 2019

A new F-Secure report documents ransomware getting more fearsome, but there’s reason for optimism.

Read More
NEWS
EMA’s research highlights the importance of context-aware security and zero password authentication

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or...

Read More
NEWS
Warrington Borough Council selects Pulse Secure

Pulse Secure Elite Partner DXC delivers upgraded secure access without user disruption to help the council better manage third-party service delivery and flexible working.

Read More
NEWS
Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities...

Read More
NEWS
Delivering Privilege Management as a Service

BeyondTrust has introduced the new Privilege Management SaaS, supporting Windows desktops/servers...

Read More
NEWS
Cloud deployments surpass security capabilities

FireMon has released its 2020 State of Hybrid Cloud Security Report, the annual benchmark of the...

Read More
NEWS
McAfee helps partners to build competitive edge

McAfee, the device-to-cloud cybersecurity company, has introduced partner program innovations,...

Read More
NEWS
Unprotected machine identities cost billions

Venafi sponsored report by AIR Worldwide reveals large companies will see the highest proportion of...

Read More
NEWS
Poor authentication practices persist in global organisations

Ponemon Institute study uncovers demand for passwordless protection of user accounts, as...

Read More
NEWS
Exabeam unveils Cybersecurity Scholarship Program

Three awards designed to recognise and cultivate the next generation of cybersecurity professionals.

Read More
NEWS
Uncovered - the countries most at risk from cybercrime

The severity of cyber-breaches has become more and more intense in recent years. As a result,...

Read More
NEWS
Phishing attempts grew by 640% last year

OpenText has issued the 2020 Webroot Threat Report, highlighting not only the agility and...

Read More
NEWS
Rethinking identity

SailPoint Technologies Holdings has unveiled new updates to the SailPoint Predictive IdentityTM...

Read More
NEWS
Pulse Secure to power Interdata EasyConnect in France

Pulse Secure to power Interdata EasyConnect in France

Read More

Videos

Kiersten Hileman, Available Infrastructure VP of Partner Relations, discusses Project Qestrel, a nationwide fleet of cybersecure, private neocloud edge data centres – the initial phase, to be live by the end...
In this interview, Cathleen Nelson, VP Cloud Partnership at WSO2, discusses how enterprises are moving from treating AI as an add-on to embedding it at the heart of modern digital architecture. The...
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.