NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months
  • Posted on 4th August 2017 in by Phil Alsop

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware strains using SSL to encrypt activity.

Read More
NEWS
Data loss is the major Cloud concern
  • Posted on 3rd August 2017 in by Phil Alsop

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017 Spotlight Report,” that explores the latest cybersecurity trends and organisational investment priorities among companies in the UK, Benelux and Nordics.

Read More
Honeywell completes Nextnine acquisition
  • Posted on 2nd August 2017 in by Phil Alsop

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems
  • Posted on 2nd August 2017 in by Phil Alsop

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments.

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT...

Read More
NEWS
DDoS attacks are longer and 'more demanding'

The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The...

Read More
NEWS
Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of...

Read More
NEWS
DDoS attacks on the increase

Financially motivated DDoS attacks driven by criminal extortion have garnered security...

Read More
NEWS
McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More
Making a drama out of security

Forcepoint Cloud Security enhances process, people and technology readiness to combat ransomware...

Read More
IT teams and the C-suite must work together to deliver comprehensive cyber-security

Cyber-security is rarely out of the news these days, with large businesses and organisation...

Read More

Videos

Paul Christensen, Macquarie Data Centres General Manager, discusses the company’s 47MW IC3 Super West Sydney AI data centre, in the context of its plans to build out some 200MW of AI and cloud capacity in...
Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

Expert Opinions

By Peter Manta, AI Strategy and Practice Director, Informatica by Salesforce.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Graham Jarvis, Freelance Business and Technology Journalist