Watchful Software expands executive leadership team

David Thornbury joins as Vice President, Worldwide Sales to spearhead expansion of global sales.

Read More

K3 Hosting forms channel partnership with Webroot

Global consultancy K3 Hosting has boosted its Managed Services offering by becoming a Webroot channel partner. The collaboration further strengthens K3 Hosting’s offering of cloud and managed services to companies globally.

Read More

2015 predictions

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud predictions for 2015.

Read More

Protecting against DDoS attacks – how well prepared are Data Centres?

By Dave Larson, CTO and VP Product at Corero Network Security.

Read More

Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

Invu’s predictions for 2015

These predictions for 2015 are from Stuart Evans, Chief Technology Officer, at Invu.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
New Registry Container Scanning automatically prioritizes and prevents container vulnerabilities in...
Extends the Dynatrace platform’s existing security capabilities to enable customers to drive...
PolySwarm’s open source, decentralised threat intelligence ecosystem rewards security experts and...
Introduces zero sign-on technology to eliminate passwords.
Secure, high-speed network supported by Smart OmniEdge AI-solution brings greater reliability and...
New Venafi research shows that ransomware attackers are regularly exfiltrating data, circumventing...