AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the key security features of Amazon Web Services and provides tips on best practice.

Read More
HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More
Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of...

Read More
Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...

Read More
Trustwave plans global expansion in Managed Security Services

Follows the completion of acquisition by Singtel; combines Singtel’s extensive customer reach...

Read More
Almost a third of organisations unable to detect intruders on network  

New Lieberman Software study reveals organisations are relying on traditional IT security solutions...

Read More
Kaspersky Lab appoints Exertis UK Ltd as new B2B channel distributor

Kaspersky Lab has extended its partnership with Exertis UK Ltd, a leading UK distributor providing...

Read More
Varonis and HP interoperability

Varonis Systems has announced the interoperability of its DatAdvantage and DatAlert solutions with...

Read More
Check Point introduces CPU-level threat prevention solution  

Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.

Read More
VMware presents the software-defined data centre - at scale

Designed to dramatically simplify the build out and ongoing operations of software-defined data...

Read More
Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...

Read More
Dell simplifies path to Cloud, Virtualization and VDI

New release of Dell Active System Manager supports deep integration with the VMware portfolio to...

Read More
Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for...

Read More
AirGate accesses DDoS protection services

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the...

Read More

Videos

CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Heiko Ludwig, Global Head of Structure Finance at NORD/LB, discusses the findings of the company’s recent report, ‘Power Struggle: Meeting the challenge of financing data centres and the energy...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

Jamie Akhtar, CEO and Co-Founder of CyberSmart
By Cody David. Head of AI and Innovation. Syniti - part of Capgemini.
By Richard Mitchell, Head of Channel, ThreatAware