85% of enterprises keeping sensitive data in the Cloud

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More
Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks increased sharply during the month.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to advanced messaging including RCS.

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More
50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data...

Read More
prpl Foundation demonstrates security by separation for IoT and other connected embedded devices

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal...

Read More
Tools4ever introduces IDaaS Cloud solution: HelloID

HelloID combined with Tools4ever’s E-SSOM offers 100 percent single single-on.

Read More
Morgan Lewis expands Global eData Service offerings with EU data centre launch

eData team to host webinar on the current state of EU data privacy law and the firm’s new EU...

Read More
17 per cent of IT managers admit to hacking

Absolute® Software has published the results of a research report the company conducted among...

Read More
CensorNet acquires SMS PASSCODE

Acquisition will accelerate company’s global expansion and seize the market opportunity for a...

Read More
Tripwire debuts Online Security Application Exchange Platform

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More
Nexsan adds Web browser access

Nexsan says that its family of Transporter private cloud file sync and share...

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.
By Martin Jakobsen, Managing Director, Cybanetix
By Andy Cocking, Sales Director, MSP, EMEA & APAC, Barracuda