NEWS
AI-powered service seeks to remove excessive cloud permissions
  • Posted on 11th November 2020 in by Phil Alsop

CyberArk has introduced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, artificial intelligence-powered service designed to strengthen the security of cloud environments. Through continuous monitoring of cloud access, CyberArk enforces least privilege by identifying and...

Read More
NEWS
Bring your own danger?
  • Posted on 9th November 2020 in by Phil Alsop

New data reveals organisations do not have sufficient visibility into the devices used by employees.

Read More
NEWS
McAfee sees Covid-19 and PowerShell threats proliferate
  • Posted on 9th November 2020 in by Phil Alsop

McAfee has released its McAfee Labs Threats Report: November 2020, examining cybercriminal activity related to malware and the evolution of cyber threats in Q2 2020.

Read More
NEWS
Smart access control is the future
  • Posted on 9th November 2020 in by Phil Alsop

2N, the global intercoms leader, forecasts that COVID-19 and security concerns will lead to smartphone credentials becoming the mainstream choice for access control in buildings.

Read More
NEWS
Westcon signs distribution agreement with AttackIQ

The agreement will cover distribution in the EMEA and APAC regions.

Read More
NEWS
Ping Identity to acquire Symphonic Software

Ping Identity Holding has acquired Symphonic Software, a leader in dynamic authorization for...

Read More
NEWS
Integrated architecture secures cloud native application ecosystem

McAfee MVISION Cloud Native Application Protection Platform delivers comprehensive data protection,...

Read More
NEWS
Cyber security has to be a C-Level priority

The importance of an integrated IT security strategy is steadily increasing, especially in current...

Read More
NEWS
Remote operations lack remote access security

The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital...

Read More
NEWS
Thales launches Identity Verification Suite

Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...

Read More
NEWS
Half of application security flaws remain open six months after discovery

SOSS Volume 11 finds 76% of applications have at least one security flaw.

Read More
NEWS
Employee education singled out as the biggest cybersecurity weakness during lockdown

Thirty per cent of respondents admit to using unencrypted devices according to latest Apricorn poll.

Read More
NEWS
Zero trust momentum continues

Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of...

Read More
NEWS
Sophos launches Rapid Response service

Sophos has introduced Sophos Rapid Response, thought to be an industry-first, fixed-fee remote...

Read More
NEWS
BeyondTrust predicts the future

BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in...

Read More

Videos

In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Chris Ackerson, SVP of Product at AlphaSense.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge