Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to...

Read More
Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool...

Read More
Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to...

Read More
Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More
Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration...

Read More
Okta appoints Andrew Wittman to Chief Marketing Officer

Okta has announced the appointment of Andrew Wittman to chief marketing officer (CMO). As CMO,...

Read More
Dell unveils ‘powerful new solutions’ at Vmworld

Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...

Read More
Focus is on software security design flaws

Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...

Read More
HyTrust partners with Intel

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...

Read More
‘Comprehensive’ protection for the hybrid data centre

McAfee, part of Intel Security, has announced key advancements to its Server Security Suites...

Read More
Is £266bn just the tip of the Cybercrime iceberg?

By Mark Sparshott, EMEA Director at Proofpoint.

Read More
Tripwire survey examines views of information security professionals at annual IT security conference

Tripwire, Inc. has announced the results of a survey of 215 attendees at the Black Hat USA 2014...

Read More
Data breaches prompt UK businesses to re-think data protection strategy

Trend Micro research finds majority of organisations lack customer notification processes required...

Read More
How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly...

Read More

Videos

Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...

Expert Opinions

By Sam Kirkman, Director of Services for EMEA at NetSPI.
By Jason Bayton, Android Enterprise Expert and Product Lead at NinjaOne.
By Matt Tebay, Multi-cloud evangelist, OVHcloud.