2015 predictions

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud predictions for 2015.

Read More

Protecting against DDoS attacks – how well prepared are Data Centres?

By Dave Larson, CTO and VP Product at Corero Network Security.

Read More

Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

How data security dominated the data recovery conversation in 2014

Data security, business continuity and mobile devices were among the biggest trends impacting the data recovery industry in 2014, according to year-end information from leading provider Kroll Ontrack. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.

Read More

New challenges and risk mitigation drive changes to IT security

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More

ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from customers, partners, and industry analysts and insiders, ExtraHop expects to see enterprises shift their focus from big suite vendors to new, best-of-breed solutions that scale to meet demand on performance, availability, and security.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
New SOTI report finds almost half (48%) of consumers have abandoned an online purchase because they...
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...
Analyst-led research reveals cloud-based identity management is needed to support stronger...
Informatica has revealed that only a quarter of U.K. businesses believe their organisation could...
‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders...
With every email now a target and every piece of data at risk, the need for data protection...