Palo Alto Networks adds to endpoint protection
  • Posted on 22nd March 2018 in by Phil Alsop

Palo Alto Networks has introduced advancements to its Traps™ advanced endpoint protection offering.

Read More
AlgoSec launches AlgoBot
  • Posted on 20th March 2018 in by Phil Alsop

AlgoBot answers users’ questions and assists with security policy tasks via an intuitive self-service interface that saves time and improves responsiveness and service.

Read More
Phishing emails deemed number one threat by UK businesses
  • Posted on 20th March 2018 in by Phil Alsop

UK businesses rank hackers outside of top five cyber threats to the organisation.

Read More
28% of IT decision makers unsure of their regulatory compliance needs
  • Posted on 20th March 2018 in by Phil Alsop

Research reveals 33% of IT decision makers believe managing compliance is responsibility of C-level.

Read More
NEWS
Cloud and cybersecurity misalignment

The majority (70 percent) of cybersecurity professionals working in large organizations across...

Read More
NEWS
Almost two thirds of finance organisations are preparing for a blockchain revolution

Nearly two thirds (65%) of finance organisations are already prepared or preparing for an...

Read More
NEWS
Rush to the Cloud bypasses security

The majority (68 percent) of cybersecurity professionals working in large organisations in the UK...

Read More
NEWS
AWS adoption is broad in EMEA but security and compliance is lagging behind

Sumo Logic reveals YoY EMEA trends within each tier of the modern application stack.

Read More
NEWS
IT leaders wrestling with hyperconverged infrastructure security

Only 15% of IT Decision Makers (ITDM) report having HCI as part of their infrastructure, citing...

Read More
Royal Thai Army Hospital stays healthy

Partnership will help defend businesses, governments and consumers against emerging advanced...

Read More
IDaaS offering unifies access for on-premise and Cloud

OneLogin has introdued OneLogin Access — a new product that for the first time allows...

Read More
Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other...

Read More
Equinix enhances its global platform

Equinix has launched Equinix SmartKey, a global key management and encryption Software as a...

Read More
Survey reveals access controls audit failures

Thycotic has released the results from its 2018 Global State of PAM Risk and Compliance report,...

Read More
NEWS
Cyberthreat report advises increased intelligence sharing and cross-industry collaboration

Blueliv has released its Annual Cyberthreat Report, compiling actionable intelligence from...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.