IoT devices increasingly used to carry out DDoS attacks

Symantec has revealed new research demonstrating how cybercriminal networks are taking advantage of lax Internet of Things (IoT) device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners.

Read More
BeyondTrust introduces free API for password management

Offers developers flexibility and security by eliminating hard-coded passwords.

Read More
Cloud Distribution appointed as A10 Networks’ approved training partner

Cloud Distribution, a next generation value-added distributor specialising in security, networking and storage, has been approved to deliver training on behalf of A10 Networks across EMEA.

Read More
ThreatConnect adds orchestration to its intelligence platform

With orchestration, ThreatConnect customers may bridge security teams, tools, processes, and threat intelligence for faster, more efficient actions.

Read More
Helping to secure the Everywhere Perimeter

Avaya is announcing a new foundation approach to network security that aims to reduce the growing...

Read More
NEWS
Malware mayhem

Phishing attacks continue to rise in volume and impact in 80 percent of businesses surveyed, with...

Read More
NEWS
Data breaches up 15% and compromised data records up 31%

Identity and personal data theft account for 64% of all data breaches.

Read More
Ping and Microsoft partner

Ping Identity is working with with Microsoft to deliver integrations that extend the value of...

Read More
NEWS
Cyber security rises to the top of the boardroom agenda

Cyber security is now considered to be an executive responsibility, with 54% of CEOs in European...

Read More
BAD for AWS!

LightCyber, provider of Behavioural Attack Detection solutions, has introduced new Magna products...

Read More
Survey finds security is the top IT priority

Top business priority is improving efficiency.

Read More
BeyondTrust expands Cloud offerings

Amazon Marketplace edition brings flexibility and security to cloud environments.

Read More
CyberArk expands global Channel Partner Programme

Access to new training and technical sales tools enhance partners’ privileged account...

Read More
NEWS
Over two-thirds of businesses at risk over new EU data protection laws

43% of businesses put customer privacy at risk by failing to anonymise test data.

Read More
One in five businesses don’t test for security vulnerabilities

Osterman Research and Trustwave have released a new report that shows many businesses fail to...

Read More

Videos

Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By James Preston, Principal Security Consultant at ANSecurity.
By Martin Jakobsen, Managing Director, Cybanetix
By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.