Try before you buy encryption
  • Posted on 7th March 2017 in by Phil Alsop

Thales says that enterprises may now test-drive its Vormetric Transparent Encryption solution for use on Google Cloud Platform. Powered by Orbitera, Test Drive is a fully functioning and interactive software demonstration that allows companies concerned about securing their cloud deployments...

Read More
Centrify expands mobile security offering
  • Posted on 6th March 2017 in by Phil Alsop

Extends commitment to securing apps and endpoints with adaptive and context-aware policy.

Read More
Informatica advances data security intelligence
  • Posted on 3rd March 2017 in by Phil Alsop

Latest Informatica Secure@Source release solves complex enterprise data security challenges for cloud, data lakes and compliance.

Read More
NEWS
Global cybersecurity report reveals misaligned incentives
  • Posted on 2nd March 2017 in by Phil Alsop

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
IGEL extends Endpoint Management

The new IGEL Cloud Gateway software supports the simple, smart and secure anytime, anywhere...

Read More
Firewall helps pave secure path to 5G

A10 Networks expands carrier-class Gi/SGi firewall lineup with enhanced security and NFV-ready...

Read More
Businesses confused about EU’s Data Privacy Regulation

Encryption desired by over one third of the companies.

Read More
Lidera Network signs agreement with Cylance

Cylance and Lidera Network to offer a revolutionary cybersecurity solution that protects...

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...

Read More
Informatica Axon 'transforms' enterprise data governance

Informatica has introduced Informatica Axon, said to be the industry’s first fully integrated,...

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as...

Read More
Ransomware threat doubles

Check Point’s H2 2016 Global Threat Intelligence Trends Report, highlights key trends in network...

Read More
Business demand for data erasure up by 466%

Lots of businesses still unaware of the impact ‘right to be forgotten’ will have.

Read More
NEWS
2016: a year of ransomware in spam

According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam...

Read More
Cybersecurity certification first to address behavioural analytics

CompTIA Cybersecurity Analyst (CSA+) becomes first training tool incorporating in-depth...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Lorenzo Romano, CEO of GCX Managed Services
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Jon Healy, Regional Strategic Operations Officer at Salute.