BLOG

From Chaos to Control: The Role of Frameworks in Building Resilient Cyber Security

By James Preston, Principal Security Consultant at ANSecurity.

Read More

BLOG

Why IT and OT recovery strategies must evolve

By Rob Demain, CEO, e2e-Assure.

Read More

VIDEO

CISO report reveals the extent of the cybersecurity challenge in the age of AI

CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report, designed to serves as a vital guide for security leaders navigating exponential attack surface growth due to AI. It empowers Chief Information Security Officers (CISOs) with critical intelligence, enabling them to make data-driven decisions about risk profiles, resource allocation, and...

Watch now

BLOG

The rise of AI-driven cyber threats: what mid-market businesses should know

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.

Read More

BLOG

How can Europe reclaim control over its data?

By Matthias Nijs, VP of EMEA, Datadobi.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
New report highlights top trends and expert insights around AI’s transformation of the video...
Cyber-security firm to work with security specialist value-added distributor to support aggressive...
Expanding beyond technology, Acronis democratises enterprise-grade cybersecurity with a...
Purpose-built security data lake helps organizations aggregate, manage, and analyze log and event...
WithSecure’s Activity Monitor technology rolls back changes to data caused by malware.
The London Internet Exchange (LINX) becomes the first UK-based internet exchange point (IXP) to...