Zero Trust Environment Infrastructures and the role of the CIO

By Dr. Wieland Alge, Vice President and General Manager EMEA Barracuda Networks.

Read More

Dell offers top five best practices for overcoming BYOD and mobile security challenges

Tips for finding the right balance between data security and workforce productivity.

Read More

Policy optimiser closes costly ‘access gap’

FireMon has announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.

Read More

Major reorganisation at Wick Hill

New Training Centre and new Professional Services Manager role at Wick Hill, as the VAD provides the framework for more growth.

Read More

Why do SIEM solutions only cater for the Global 2000?

Now with real-time File Integrity Monitoring (FIM), latest SolarWinds® Log & Event Manager 6.0 is a SIEM solution to deliver greater intelligence into security monitoring, remediation and an affordable price point any IT organization can afford.

Read More

First Government approved phishing service for the public sector

Global information security firm MWR InfoSecurity has become the first provider of phishing assessment services to be listed on G-Cloud, the UK Government’s approved online marketplace for the public sector.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Corero Network Security has published the results of the second-annual study of service...
451 Research is pleased to announce the hiring of two new members to its growing analyst team:...
Imperva has published the results of a survey of 310 IT security professionals taken at the...
60% of breaches in 2019 involved vulnerabilities where available patches were not applied.
Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with...
Access to new training and technical sales tools enhance partners’ privileged account...