Keep safe with a context-aware security approach  

Findings show many of today’s traditional security policies result in too many passwords, access protocols and employee workarounds that expose the business to risk.

Read More
Identity theft accounts for over half of all data breaches

Gemalto has released the findings of the Breach Level Index for the first six months of 2015, revealing that 888 data breaches occurred, compromising 246 million records worldwide.

Read More
Okta closes $75 million in financing

Okta, the leading identity and mobility management company, has secured $75 million in new financing. Existing investors Andreessen Horowitz, Greylock Partners and Sequoia Capital, who have witnessed Okta's rapid growth first-hand, led the round with participation from Khosla Ventures,...

Read More
Okta opens EU data centre  

Investment in new, local infrastructure signals long-term strategy for customer expansion and ambitious plans for growth.

Read More
AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the...

Read More
HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address...

Read More
Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade...

Read More
Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...

Read More
Trustwave plans global expansion in Managed Security Services

Follows the completion of acquisition by Singtel; combines Singtel’s extensive customer reach...

Read More
Almost a third of organisations unable to detect intruders on network  

New Lieberman Software study reveals organisations are relying on traditional IT security solutions...

Read More
Kaspersky Lab appoints Exertis UK Ltd as new B2B channel distributor

Kaspersky Lab has extended its partnership with Exertis UK Ltd, a leading UK distributor providing...

Read More
Varonis and HP interoperability

Varonis Systems has announced the interoperability of its DatAdvantage and DatAlert solutions with...

Read More
Check Point introduces CPU-level threat prevention solution  

Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.

Read More
Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...

Read More
Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for...

Read More

Videos

Dan Wensley, CEO, GTIA, talks about the role of the association as it unites ITSPs, MSPs, vendors and distributors as they address the challenges, and opportunities, of AI, cybersecurity and cloud, alongside...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Ben Pritchard, AVK CEO, discusses the findings of a joint Wartsila and AVK-SEG white paper: Data centre dispatchable capacity: a major opportunity for Europe’s energy transition, which provides new analysis...

Expert Opinions

By Masha Sedova, Vice President of Product Management, Human Risk, Mimecast.
By Nadeem Azhar, Founder and CEO of a Houston-based technology firm specializing in technology-driven efficiency solutions.
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...