Eliminating security gaps
  • Posted on 30th April 2014 in by Phil Alsop

CyberArk has extended the CyberArk Privileged Account Security Solution to all major public, private, hybrid cloud and software as a services (SaaS) environments. By integrating with leading business, social media, IT and operational cloud solutions, CyberArk empowers customers to discover, monitor...

Read More
IT Governance launches multiple ISMS version Of vsRisk
  • Posted on 30th April 2014 in by Phil Alsop

IT Governance, the major reseller of vsRisk™, a Vigilant Software product, has launched the latest version of the risk assessment software vsRisk™, which is fully compatible with ISO27001:2013. The new version also presents the opportunity to apply it to multiple information security...

Read More
IT Governance launches Cyber Essentials products
  • Posted on 30th April 2014 in by Phil Alsop

IT Governance, the global leader in information security, IT governance, risk management and compliance expertise, is launching a range of unique products and services designed to help British organisations implement the newly released Cyber Essentials Scheme Requirements. These include a Cyber...

Read More
Imperva advances protection against data breaches
  • Posted on 30th April 2014 in by Phil Alsop

Imperva Inc. has announced the availability of SecureSphere 10.5. With today’s announcement, Imperva is addressing the massive security gaps left by increasingly complex IT infrastructures, and is delivering industry leading protection against insider threats.

Read More
Alert Logic announces international expansion Into EMEA

Alert Logic has announced its international expansion into EMEA. The US-based company recently...

Read More
ManageEngine fortifies enterprise security log analytics

New SIEM GA features: real-time event correlation, complete user audit trail, ISO 27001 reporting,...

Read More
SaaS – A growing industry with a change of heart

By Anna Zetterholm, Marketing associate at Keypasco.

Read More
Software warnt vor Ausfällen unternehmensinterner Anwendungen 

Neues Whitepaper von Paessler: Applikationen und Services mit Netzwerk-Monitoring überwachen

Read More
LogRhythm kommentiert:

Deutsche Industrieunternehmen müssen zunehmend mit professioneller Wirtschaftsspionage rechnen

Read More
Akamai publishes Prolexic Q1 2014 Global DDoS Attack Report

Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.

Read More
The demise of the CIO? By 2019 the role will be fundamentally changed or eradicated

As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...

Read More
Mirantis und Ericsson schließen OpenStack Software-Deal

Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis

Read More
Understanding risk from a business perspective is a top security concern

Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...

Read More
Dell secures critical business data and devices

Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...

Read More

Videos

In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Data Centre World 2026

Expert Opinions

Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Rick Vanover, Vice President, Product Strategy at Veeam.
By Philippe Omer Decugis, General Manager EMEA & SVP Sales, BlackLine.