Reducing privileged credential risk

CyberArk has issued a new research report that recommends an accelerated 30-day plan to improve protection of privileged credentials. The report outlines a proven framework for rapid risk reduction based on lessons learned from several large data breaches and best practices from a panel of...

Read More
Aspire stops DDoS attacks

Aspire Technology Solutions has deployed Flowmon Networks' anti-DDoS intelligence to defend customers from large-scale volumetric attacks. Thanks to Flowmon, Aspire reduced the attack mitigation time from one hour to 30 seconds.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
RedSeal extends digital resilience platform

RedSeal has introduced enhancements and new integrations for its market leading network modeling...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
NEWS
F5 introduces comprehensive application security solutions for the digital economy

New solutions give customers the protection and intelligence required to keep applications and user...

Read More
Secure Cloudlink appoints former HPE VP, Lee Hughes, as Chief Sales and Marketing Officer

Cyber security specialist, Secure Cloudlink has appointed former Hewlett Packard Enterprise (HPE)...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Certificate-related outages affect 79 percent of businesses

New study from Venafi finds inadequate cryptographic controls significantly impact reliability...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More
TM Group and Arkivum partner

TM Group A/S, Scandinavia’s premier provider of advanced compliance solutions for financial...

Read More
Intelligent malware prevention just got smarter

Wedge Networks adds cloud-based malware analyzer option to the AI powered Wedge Advanced...

Read More

Videos

Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...

Expert Opinions

By Eric Herzog, Chief Marketing Officer at Infinidat.
By Andy Cocking, Sales Director, MSP, EMEA & APAC, Barracuda
By Giedrius Steimantas, Engineering Manager, Oxylabs