IoT devices increasingly used to carry out DDoS attacks
  • Posted on 23rd September 2016 in by Phil Alsop

Symantec has revealed new research demonstrating how cybercriminal networks are taking advantage of lax Internet of Things (IoT) device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners.

Read More
BeyondTrust introduces free API for password management
  • Posted on 22nd September 2016 in by Phil Alsop

Offers developers flexibility and security by eliminating hard-coded passwords.

Read More
Cloud Distribution appointed as A10 Networks’ approved training partner
  • Posted on 22nd September 2016 in by Phil Alsop

Cloud Distribution, a next generation value-added distributor specialising in security, networking and storage, has been approved to deliver training on behalf of A10 Networks across EMEA.

Read More
ThreatConnect adds orchestration to its intelligence platform
  • Posted on 21st September 2016 in by Phil Alsop

With orchestration, ThreatConnect customers may bridge security teams, tools, processes, and threat intelligence for faster, more efficient actions.

Read More
Helping to secure the Everywhere Perimeter

Avaya is announcing a new foundation approach to network security that aims to reduce the growing...

Read More
NEWS
Malware mayhem

Phishing attacks continue to rise in volume and impact in 80 percent of businesses surveyed, with...

Read More
NEWS
Data breaches up 15% and compromised data records up 31%

Identity and personal data theft account for 64% of all data breaches.

Read More
Ping and Microsoft partner

Ping Identity is working with with Microsoft to deliver integrations that extend the value of...

Read More
NEWS
Cyber security rises to the top of the boardroom agenda

Cyber security is now considered to be an executive responsibility, with 54% of CEOs in European...

Read More
BAD for AWS!

LightCyber, provider of Behavioural Attack Detection solutions, has introduced new Magna products...

Read More
Survey finds security is the top IT priority

Top business priority is improving efficiency.

Read More
BeyondTrust expands Cloud offerings

Amazon Marketplace edition brings flexibility and security to cloud environments.

Read More
CyberArk expands global Channel Partner Programme

Access to new training and technical sales tools enhance partners’ privileged account...

Read More
NEWS
Over two-thirds of businesses at risk over new EU data protection laws

43% of businesses put customer privacy at risk by failing to anonymise test data.

Read More
One in five businesses don’t test for security vulnerabilities

Osterman Research and Trustwave have released a new report that shows many businesses fail to...

Read More

Videos

Nicolas Leszczynski, Principal Solution Engineer at Riverbed, discusses the results of the recent Riverbed Global AI & Digital Experience Survey, which finds that organisations are at an inflection point as...
Deborah Garand, Managing Director - High Tech, Accenture, discusses the findings of the company’s recent ‘As a Service, at Your Service’ research report which looks at the challenges and opportunities...
Tal Eisner, Guardz VP of Product Marketing, discusses the findings of the company’s recent MSP survey, which are that MSPs are juggling as many as 10 cybersecurity point solutions to protect their SMB...
Dina Knight, Chief People Officer, Logicalis, is accountable for all aspects of Logicalis’ and parent company, Datatec’s, people operations strategy from the board level down. In her role, Dina ensures...

Expert Opinions

By Liz Centoni, Chief Customer Experience Officer, Cisco.
By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist – Business and Technology, Trudy Darwin Communications.
By Daniel Bailey, Senior Vice President and Regional Sales Leader EMEA at Genesys.