Cryptominers and Cloud - the security 'sweetspots'

Check Point’s “Cyber Attack Trends: 2018 Mid-Year Report” reveals 42% of organizations globally hit by cryptomining attacks, while sophisticated Gen V attacks on cloud infrastructures grow.

Read More
NEWS
100 percent of corporate networks highly vulnerable to insider attacks

During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise.

Read More
BeyondTrust grows its ecosystem of technology alliance partners with Thales

BeyondTrust and Thales provide customers comprehensive security to control passwords, protect data at rest, and the privileges associated with data access.

Read More
NEWS
Surveys reveal trust in banking and healthcare organisations differs widely between UK and France

A consumer survey commissioned by the Open Data Institute (ODI), and published in advance of the...

Read More
Gartner gets to grips with security and risk management

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on...

Read More
MobileIron modernises multi-factor authentication for the Cloud

MobileIron Authenticator is the next step toward simple and smart security for modern work.

Read More
CompTIA pledges to get the UK Cyber Ready

CompTIA announces government funding for Cyber Ready retraining initiative, giving applicants a...

Read More
NEWS
T?V Rheinland launches Global Industrial Cybersecurity Center of Excellence

Global testing and inspection service provider continues to build next generation industrial...

Read More
NEWS
Goldman Sachs rolls out worldwide cyber security skills programme with Immersive Labs

Virtual learning platform provides easily accessible cyber war scenarios that...

Read More
Five keys to secure DevOps, Cloud, and IoT adoption

82 percent of respondents say that privileged access management facilitates the move to...

Read More
Fortinet acquires Bradford Networks

Strengthens Fortinet Security Fabric and extends segmentation and security to the edge of the...

Read More
Cybersecurity pressures increasing

Trustwave has released the 2018 Security Pressures Report based on a global survey of 1,600...

Read More
Pulse Secure simplifies and extends secure access

Pulse Connect Secure 9.0 simplifies multi-cloud connectivity intelligence and protection, extends...

Read More
Efficient access management

BeyondTrust has introduced two new features in PowerBroker for Windows that help IT...

Read More

Videos

Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...
In this interview, Cathleen Nelson, VP Cloud Partnership at WSO2, discusses how enterprises are moving from treating AI as an add-on to embedding it at the heart of modern digital architecture. The...
Ofir Bloch, VP at WalkMe, discusses the results of WalkMe’s fifth annual State of Digital Adoption report, which reveals that over half (54%) of workers bypassed AI tools and completed tasks manually at...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...

Expert Opinions

Connectivity, Not Compute, Will Decide the AI Race. By Mahesh Krishnaswamy, Founder and CEO of Taara.
Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.
By George Ashwin, UK Channel Director at AddOn Networks
In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.