Prioritising and streamlining security operations
  • Posted on 14th June 2016 in by Phil Alsop

Tenable delivers improved security visibility and critical context to help security teams remediate vulnerabilities and mitigate security threats.

Read More
Providing security automation at scale for Linux
  • Posted on 14th June 2016 in by Phil Alsop

Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems.

Read More
DNS attacks costing businesses more than $1 million
  • Posted on 13th June 2016 in by Phil Alsop

But almost 30 per cent of organisations still don’t rate DNS as an important part of their business.

Read More
ManageEngine adds SSL Certificate Management to its Privileged Identity Management Suite
  • Posted on 13th June 2016 in by Phil Alsop

ManageEngine has introduced SSL certificate management support in Key Manager Plus, its comprehensive, web-based solution for managing digital keys. Available immediately, the new version of Key Manager Plus provides visibility and centralised control over the entire life cycle of...

Read More
Security and speed are the main barriers to a connected workforce

A survey conducted by Nexsan has revealed that data security and download speeds were the...

Read More
NEWS
Over a third of organisations are yet to develop a cyber-attack response plan

Lack of preparation by businesses alarming due to multi-faceted threat landscape.

Read More
Proofpoint delivers threat context into Splunk software

Multiple technology integrations enable Proofpoint email and social media context to be easily...

Read More
A clouded security picture?

Blue Coat Systems has revealed the initial results from an online study conducted by YouGov of...

Read More
Chemring launches 'world’s first AI cyber security system'

Chemring Technology Solutions has launched ForensicAI, an advanced system of artificial...

Read More
NEWS
Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were...

Read More
Trustwave and CounterTack team

Trustwave and CounterTack have formed an alliance to help businesses minimize the impact of...

Read More
WatchGuard acquires Hexis HawkEye G

Resulting technology integration will enable organisations to prevent, detect, correlate, and take...

Read More
ExtraHop debuts ransomware bundle

ExtraHop has introduced its new ransomware bundle for EMEA businesses to proactively prevent,...

Read More
Turn-key threat intelligence gateway

Filtering traffic from malicious IP addresses at line speed boosting efficiency and...

Read More

Videos

In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...

Expert Opinions

MSP Channel Insights sat down with Steven Heinsius, Vice President, Product Management and Marketing EMEA at Comstor, for an exclusive interview to explore how Cisco 360 is reshaping partner engagement,...
By Sadiq Syed, SVP, Digital Buildings at Schneider Electric.
By Graham Jarvis, Freelance Business and Technology Journalist
By Alistair Barnes, Head of Mechanical Engineering at Colt DCS.