NEWS
The sorry state of affairs of software components
  • Posted on 12th June 2017 in by Phil Alsop

Synopsys has released its report, “The State of Software Composition 2017,” which analyses real-world data to investigate the security of the software supply chain ­ one of the most significant challenges the software industry faces today. The report summarises the analysis of 128,782...

Read More
Security professionals point to bored and distracted employees as biggest potential data security risk
  • Posted on 9th June 2017 in by Phil Alsop

Over half say they would trust technology over humans as a way of avoiding mistakes.

Read More
Vectra Networks identifies technology sector as most resilient to cyber attacks
  • Posted on 8th June 2017 in by Phil Alsop

Research finds rates of reconnaissance, lateral movement, and exfiltration detections increased by over 265 per cent.

Read More
High-Tech Bridge releases application security trends report
  • Posted on 7th June 2017 in by Phil Alsop

The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

Read More
Gigamon reinforces relationship with Exclusive Group

Network and security visibility vendor consolidates distribution strategy with Exclusive Networks.

Read More
NEWS
Vectra Networks identifies healthcare as the industry most highly targeted by cyber attacks

Research finds rates of reconnaissance, lateral movement, and exfiltration detections increased by...

Read More
NEWS
Ransomware calm before the storm

PhishMe has released its comprehensive malware trends analysis for Q1 2017 as well as announced...

Read More
Mainframe more secure than other systems

80% of retail organizations rely only on log-files to detect insider threats on the mainframe,...

Read More
Cyphort debuts the Anti-SIEM

First open demonstration of advanced security analytics, advanced threat defense and auto...

Read More
SailPoint introduces standardised approach to extend identity governance to privileged accounts

New Privileged Account Management Module provides oversight and control for highly privileged...

Read More
Ipswitch extends secure file transfer and network monitoring software

Ipswitch has strengthened the ability of IT teams to meet the data security and performance...

Read More
Major gaps in security strategies

Endpoint security seen as key to more integrated approach.

Read More
Unifying security enforcement across the entire enterprise

Juniper Networks has introduced enhancements to its Software-Defined Secure Networks (SDSN)...

Read More
iland achieves Cloud Security Alliance STAR Gold Certification

iland has achieved the Cloud Security Alliance (CSA) STAR Certification, becoming only the second...

Read More
Processing the rising tide of encrypted internet traffic

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations...

Read More

Videos

Data Centre World 2026
Data Centre World 2026
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

Expert Opinions

By Matt Roberts, VP of Sales, OptiCool Technologies.
By Arash Ghazanfari, CxO Advisor, UK & Europe, Dell Technologies.
By Graham Jarvis, Freelance Business and Technology Journalist