Check Point launches World Cyber Threat Map
  • Posted on 30th April 2015 in by Phil Alsop

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More
Legacy solutions failing to prevent attacks
  • Posted on 27th April 2015 in by Phil Alsop

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks...

Read More
Know your enemy: Why it is important to think like a cyber attacker in order to keep your data secure
  • Posted on 27th April 2015 in by Phil Alsop

By Erik Driehuis, VP EMEA, Digital Guardian.

Read More
Fat lady sings as Dell transforms the Royal Opera House's IT infrastructure
  • Posted on 23rd April 2015 in by Phil Alsop

Full end-to-end IT deployment from the desktop to the data centre.

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make...

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More
CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More
FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More

Videos

We caught up with Matthias Haymoz from SDEA at Data Centre World Frankfurt 2025 to hear about the company’s presence at the event and their role in the data centre landscape. Watch the full interview to...
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
Brian Rhoney, Data Center Market Development Manager at Corning Optical Communications, explains how operators face challenges of scale and density in meeting the infrastructure requirements of AI, both inside...
At Data Centre World Frankfurt 2025, we spoke with Cecilia Hjertzell from T-Loop to learn more about the company’s presence at the event and her perspective on the industry.

Expert Opinions

International Women in Engineering Day provides an opportunity to celebrate the women driving diversity in STEM and reflect on the ongoing journey toward gender equality.
By Chris Wysopal, Co-founder and Chief Security Evangelist at Veracode.
By Avi Perez, CTO of Pyramid Analytics.
By Hans Nipshagen, Vice President Channel at nLighten.