Tenable Network Security partners with CyberArk
  • Posted on 15th June 2015 in by Phil Alsop

Technology integration between Tenable and CyberArk delivers market-defining continuous network monitoring and industry leading credential management capabilities in one easy package.

Read More
Research predicts a major increase in cybersecurity costs 
  • Posted on 12th June 2015 in by Phil Alsop

Juniper Networks, in partnership with the RAND Corporation, a nonprofit institution that helps improve policy and decision-making through research and analysis, has unveiled insights into the economic challenges, trade-offs and demands facing companies as they protect themselves against...

Read More
DDoS attacks resemble Advanced Persistent Threats in sophistication
  • Posted on 11th June 2015 in by Phil Alsop

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against...

Read More
Disagreement over security objectives
  • Posted on 11th June 2015 in by Phil Alsop

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT...

Read More
Cisco embeds security everywhere

Cisco has introduced new offerings to embed security throughout the extended network – from...

Read More
Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better...

Read More
Sophos adds email security

Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.

Read More
BT secures cloud services integration offering with Check point software technologies

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More
Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...

Read More
Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are...

Read More
Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More

Videos

Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Welcome to the WinStar Introductory Presentation!
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...

Expert Opinions

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Dael Williamson, EMEA CTO, Databricks.
By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.