Cloud services putting businesses at risk
  • Posted on 14th April 2014 in by Phil Alsop

New report from Skyhigh Networks analyses data from more than a million users to uncover usage and risk trends; Points to a need for greater employee education about data protection and privacy.

Read More
Simplifying Certificate Management, Credentialing
  • Posted on 10th April 2014 in by Phil Alsop

New cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing.

Read More
Authentication – an update
  • Posted on 7th April 2014 in by Phil Alsop

Ian Kilpatrick, chairman Wick Hill Group, looks at the current state of authentication and examines the solutions on offer from two companies in Gartner’s Magic Quadrant

Read More
Delivering a Cloud Compliance Service
  • Posted on 7th April 2014 in by Phil Alsop

Sookasa, Inc. has emerged from stealth mode to radically simplify the protection of sensitive files across popular cloud services and mobile devices. Sookasa is the first company to enable professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices,...

Read More
European Standardization Organizations discuss role of standards

A high-level delegation from the European Standardization Organizations (ESOs) – CEN, CENELEC...

Read More
Global attack intelligence integrated into local protection

Arbor Networks, Inc. has announced a new reputation-based threat feed as part of its ATLAS®...

Read More
Insider-Angriffe: Risiko steigt

Vormetric-Umfrage zeigt unzureichende Kontrolle privilegierter Benutzerkonten in deutschen...

Read More
NTT Com Security continues to build IT security leadership in Europe with BDG acquisition

NTT Com Security has acquired BDG GmbH & Co. KG, an IT security company in Germany.

Read More
NSA revelations impact on the Cloud

Report highlights nine major after-shocks compelling organisations to think again about how they...

Read More
Cyber attack ‘Hit List’ expands

Disruptive hacking tactics see financial services industry join government as most at risk for DDoS...

Read More
Integrated retrospective packet forensics

Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic...

Read More
Government surveillance is driving a third of organizations away from the Cloud

A third of IT security professionals do not keep corporate data in the cloud because of fear of...

Read More
NTT Innovation Institute announces availability of 2014 Global Threat Intelligence Report

Analysis of three billion attacks in 2013 reveals SQL Injections cost $196,000 and anti-virus...

Read More
Don’t let Snowden Leaks chill cloud adoption

By Campbell Williams, group strategy and marketing director, Six Degrees Group.

Read More
Cyber black market is a ‘mature economy’

Juniper Networks finds the cyber black markets have a mature economy with characteristics akin to...

Read More

Videos

Welcome to the WinStar Introductory Presentation!
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...

Expert Opinions

By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.
By David Davies, Associate Director at Arup.
By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
By Vivek Swaminathan, Director of Products and Solutions, Intelligent Data Center at Unisys.