Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit unencrypted user data over the insecure HTTP protocol, risking the exposure of user data. This is because some applications use third party ready-to-go advertising SDKs, which are part of some of...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security.

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers are actively working to exploit people instead of software flaws to steal money and information for financial gain, espionage, and to establish footholds for future attacks.

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More

Videos

We spoke with Kevin Blumberg from Trane during Data Centre World Frankfurt 2025 to get his thoughts on the company’s role at the event and its contributions to the data centre industry.
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
Jesse Todd, CEO of EncompaaS, explains that as data volumes explode and AI evolves at a rapid pace, ignoring unstructured data is no longer an option. Intelligent information management platforms help...
At Data Centre World Frankfurt 2025, we spoke with Cecilia Hjertzell from T-Loop to learn more about the company’s presence at the event and her perspective on the industry.

Expert Opinions

In a hyperconnected world, where information flows in real time and digital operations are mission-critical, data centers have become the backbone of the global economy. In these environments, energy is not...
By Aurore Knight, Associate Director, Black & White Engineering.
By Barley Laing, the UK Managing Director at Melissa.
By Shahar Belkin, Chief Evangelist at ZutaCore.