Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit unencrypted user data over the insecure HTTP protocol, risking the exposure of user data. This is because some applications use third party ready-to-go advertising SDKs, which are part of some of...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security.

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers are actively working to exploit people instead of software flaws to steal money and information for financial gain, espionage, and to establish footholds for future attacks.

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More

Videos

Matthew Irish, General Manager, Digital Services at Apogee Corporation, explains how and why many companies still find the idea of digital transformation overwhelming with multi-year projects that cost a...
Trustmarque, a leading technology services partner, and Ultima Business Solutions, a specialist in managed services and automation, have completed their merger. Simon Williams, CEO of the new group explains...
Data Centre World Asia 2025

Expert Opinions

By Andre Jay, Director of Technology at Warp Technologies.
By Alex Segeda, Business Manager, EMEAI at Western Digital.
By Leigh-Ann Weatherley, Business Unit Director, Digital Platform Services at Sopra Steria
By Johnny Carpenter, VP Channels and Alliances EMEA at 11:11 Systems.