NEWS
Secureworks introduces orchestration and automation solution

Secureworks has launched its Orchestration and Automation solution to help organisations reduce their cybersecurity operations workload and quickly take the right action to contain threats and eradicate them from their environment.

Read More
NEWS
NTT Security Corporation acquires WhiteHat Security

This acquisition positions NTT Security as one of the most comprehensive pure-play cybersecurity services companies.

Read More
NEWS
Gartner identifies the top seven security and risk management trends for 2019

Gartner, Inc. has identified seven emerging security and risk management trends that will impact security, privacy and risk leaders in the longer term.

Read More
NEWS
CrowdStrike introduces endpoint detection and response solution for mobile devices

CrowdStrike brings the power of the cloud-native Falcon platform to Android and iOS, further extending its market-leading EDR protection across the enterprise.

Read More
NEWS
Aqua Security introduces Serverless Function Assurance

Aqua 4.0 release also tightens Linux host protection and compliance on the heels of recent...

Read More
NEWS
UK Boards of biggest firms must do more to be cyber aware

Many FTSE 350 boards still don’t understand the impact of a cyber attack on their business.

Read More
NEWS
Spirent introduces CyberFlood Data Breach Assessment solution

Paired with deployment and operation from Spirent SecurityLabs, provides true assessment and...

Read More
NEWS
Open source breaches increase 71%

Largest ever DevSecOps survey shows 41% of executives not implementing open source governance in...

Read More
NEWS
Tripwire debuts penetration testing and industrial cybersecurity assessment services

New service offerings reinforce critical security controls, assess security weaknesses of...

Read More
NEWS
Simplifying continuous discovery and protection in the Cloud

CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and...

Read More
NEWS
Fifty percent increase in Botnet stolen credentials

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019...

Read More
NEWS
IoT devices under constant attack

Cyxtera Technologies has released findings from an extensive research project, the “Detection of...

Read More
NEWS
Verizon refocuses the cyber investigations spotlight on the world of Insider Threats

The Verizon Data Breach Investigations Report (DBIR) series opened the doors to the world of...

Read More
NEWS
Only 15 percent of UK enterprises confident in their ability to defend themselves

Inability to detect threats, alongside stretched budgets and talent shortage hampering large...

Read More
NEWS
Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...

Expert Opinions

By Francesco Fontana, Enterprise Marketing & Alliances Director at Aruba S.p.A.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Troels Rasmussen, GM of Security, N-able.