MobileIron and Zimperium move on mobile threats
  • Posted on 5th October 2017 in by Phil Alsop

MobileIron will integrate Zimperium’s machine learning-based threat detection with MobileIron’s security and compliance engine and sell the combined solution. This integration will address one of the most significant mobile security gaps faced by enterprises: the ability to detect...

Read More
Palo Alto Networks expands CASB offering
  • Posted on 5th October 2017 in by Phil Alsop

Palo Alto Networks says that its Cloud Access Security Broker (CASB) offering, Aperture™ SaaS security service, now provides application protections for several Amazon Web Services (AWS) solutions, including Amazon Elastic Compute Cloud (Amazon EC2), AWS Identity and Access Management...

Read More
NEWS
McAfee report highlights global impact of changing data protection landscape
  • Posted on 5th October 2017 in by Phil Alsop

Data protection delivers commercial advantage with seventy-four percent of respondents believing organizations that properly apply data protection laws will attract new customers.

Read More
Majority of UK IT professionals not confident in their company’s ability to prevent data breaches
  • Posted on 4th October 2017 in by Phil Alsop

Centrify-commissioned study reveals IT practitioners most concerned about losing jobs.

Read More
Intel Blockchain technology offered as a Service in Oracle Cloud

At Oracle OpenWorld, Intel announced that its processor technology is being utilized by Oracle to...

Read More
DDoS threats analysed in global threat report

Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of...

Read More
SailPoint survey reveals cyber risks are leaving IT in the dark

IT leaders prioritise Identity Governance for greater visibility.

Read More
Most companies are unprepared for DNS attacks

Infoblox has released results of a global survey finding that DNS security is often overlooked...

Read More
Gemalto boosts Oracle customers' security

With SafeNet Encryption and Key Management solutions customers can securely share data in the...

Read More
Almost half of UK organisations don’t feel they have the internal skills to deal with cyber threats

New research from business continuity and disaster recovery provider, Databarracks, has reported...

Read More
SolarWinds delivers visibility for managing Cisco ASA firewalls

SolarWinds Network Insight for Cisco ASA is now available as part of the latest versions of...

Read More
New Atos paper outlines major advances in cyber security

Atos, a global leader in digital transformation, believes waiting for digital threats to...

Read More
Nuvias appointed as sole pan-EMEA distributor for Dtex Systems

Dtex Systems targets growing insider threat solutions market in EMEA.

Read More
Businesses paid ?222M to ransomware hackers last year

Datto’s survey of small-to-mid-sized businesses is the largest of its kind to date, suggests...

Read More
4G and 5G networks are not ready for smart cities

Positive Technologies has issued an analytical report on fundamental security flaws in the 4G...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCW Asia 2025 - Part 1 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Haris Pylarinos, Founder and CEO of Hack The Box
By Manvinder Singh, VP of Product Management for AI at Redis.