Alert Logic launches Cloud-native vulnerability and configuration management solution on Amazon Web Services

Alert Logic has introduced Alert Logic Cloud Insight, a cloud-native vulnerability and configuration management solution designed for customers running on Amazon Web Services (AWS). Alert Logic Cloud Insight integrates with AWS native security features to provide an integrated view of potential...

Read More
Pulse Secure signs Arrow  

Announces distribution agreement with Arrow in Europe.

Read More
CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most comprehensive and accurate view of its international, multi-tenant cloud environment.

Read More
Top five ways to increase business IT security

By Roger Keenan, managing director of London data centre, City Lifeline.

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Imation Lock & Key solution provides new levels of data security  

Lock & Key is a component of Imation’s recently announced Secure Data Movement...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR)...

Read More
Blue Coat acquires Perspecsys  

Expands portfolio in exploding cloud security market, providing relief for multinational...

Read More
Bidvest Foodservice chooses Fujitsu to overhaul and manage its IT infrastructure

Contract extension sees Fujitsu partner with the food wholesaler to modernise and streamline its IT...

Read More
Gemalto enables service providers to offer trusted crypto in the cloud

Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
‘Internet of Things’ connected devices to almost triple

New data from Juniper Research has revealed that the number of IoT (Internet of Things) connected...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More

Videos

Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Nicholas Jackson, Director of Cyber Security Services at Bitdefender, discusses the company’s recent 2025 Cybersecurity Assessment Report, explain that businesses face mounting challenges and pressures as...

Expert Opinions

By Lorri Janssen-Anessi, Director of External Cyber Assessments at BlueVoyant.
By Joe Byrne, Global Field CTO at LaunchDarkly