Ixia extends CloudStorm
  • Posted on 31st January 2018 in by Phil Alsop

CloudStorm 25GE offers testing of converged multi-play services, application delivery, and network security platforms for hyperscale data centers, enterprises and network equipment manufacturers.

Read More
10 cyber security predictions for 2018
  • Posted on 31st January 2018 in by Phil Alsop

By Ronald Sens, Director EMEA Marketing, A10 Networks.

Read More
ManageEngine tunes SIEM solution to simplify GDPR compliance
  • Posted on 30th January 2018 in by Phil Alsop

Audit all relevant security events, including unsuccessful user access attempts and critical changes to personal data, using Log360's prebuilt GDPR report.

Read More
Recorded Future launches Fusion
  • Posted on 30th January 2018 in by Phil Alsop

Recorded Future has introduced Fusion, a new product providing centralization, collaboration, and customization of intelligence. With the addition of Fusion, Recorded Future becomes the only end-to-end solution for threat intelligence on the market. Now, organizations can experience rapid...

Read More
NEWS
Companies reminded of fragile consumer trust ahead of GDPR introduction

The majority (64%) of customers trust companies with their personal information. However,...

Read More
NEWS
Cyberbit to protect the Bank of Jerusalem

Bank of Jerusalem: "We evaluated the major endpoint security solutions and Cyberbit achieved the...

Read More
Acronis releases free, AI-based ransomware protection

Acronis shares its unique AI-based technology Acronis Active Protection, which numerous...

Read More
94% of organisations using cloud, IoT and other transformative technologies, data breaches at all-time high

As businesses embrace new environments, data breaches have become the new reality.

Read More
WatchGuard serves up a slice of security for Homeslice Pizza

When selecting a network and Wi-Fi security solution for its new flagship London restaurant that...

Read More
Security is in

Today marks the release of our fourth annual Businesses @ Work Report, which takes an in-depth...

Read More
NEWS
Organisations that can’t prove the adequacy of risk-based security could fail GDPR compliance

Failing to do so could leave firms having wasted time, money and effort – and facing hefty fines.

Read More
Check Point launches Infinity Total Protection

Game-changing new security deployment model for real-time prevention of threats and cyberattacks.

Read More
Palo Alto Networks delivers Cloud-based behavioural analytics

Palo Alto Networks has introduced Magnifier, a cloud-based behavioral analytics application...

Read More
Managed threat hunting services in sight

Cb ThreatSight leverages the Cb Predictive Security Cloud (PSC) to deliver managed threat hunting...

Read More
NEWS
Frequency and complexity of DDoS attacks is rising

NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Chris Ackerson, SVP of Product at AlphaSense.
By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx