Protecting against DDoS attacks – how well prepared are Data Centres?

By Dave Larson, CTO and VP Product at Corero Network Security.

Read More

Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

How data security dominated the data recovery conversation in 2014

Data security, business continuity and mobile devices were among the biggest trends impacting the data recovery industry in 2014, according to year-end information from leading provider Kroll Ontrack. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.

Read More

New challenges and risk mitigation drive changes to IT security

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More

ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from customers, partners, and industry analysts and insiders, ExtraHop expects to see enterprises shift their focus from big suite vendors to new, best-of-breed solutions that scale to meet demand on performance, availability, and security.

Read More

E-Commerce and Retail

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes a retrospective look at some of the industries hardest hit by data breaches/vulnerabilities and looks to 2015 and beyond to discuss new and emerging malware.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
By Dave Larson, CTO of Corero Network Security.
…but more companies say they are better prepared to deal with a breach or incident.
Pax8 has formed a new partnership with LogMeIn, providing its industry-leading password management...
Defence plans should be made around an asset based approach.
Some thoughts from Scott Tyson, Director of Global Sales at email security...
By Tony Marques, Encode’s Cyber Security Architect.