CyberArk adds credential theft blocking
  • Posted on 17th November 2016 in by Phil Alsop

CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting credential theft at the endpoint. CyberArk Viewfinity, with enhanced threat protection features, is now available as CyberArk Endpoint Privilege Manager.

Read More
NEWS
LeoVegas safeguards online business with Imperva
  • Posted on 17th November 2016 in by Phil Alsop

Award-winning mobile casino doesn’t gamble on security.

Read More
NEWS
Predicting a secure future?
  • Posted on 16th November 2016 in by Phil Alsop

The digital and the physical merge to create a tangled terrain.

Read More
Gemalto advances secure communications for financial services industry
  • Posted on 15th November 2016 in by Phil Alsop

Gemalto SafeNet HSM delivers highest level of digital trust to secure sensitive communications through the Symphony platform.

Read More
SailPoint names Kevin Hansel chief information officer

Identity governance leader appoints industry veteran to drive IT innovation and scale in...

Read More
Capability will determine which cloud providers thrive under the GDPR

All parties will be signing up to the GDPR so everyone must demonstrate compliance.

Read More
Report illustrates value of intelligent security management

Industry-first study quantifies security management impact on security-related risks and...

Read More
What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...

Read More
Preparing for privacy

With indicators suggesting that organisations face much work ahead, AvePoint and CIPL partner to...

Read More
Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables...

Read More
Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More
Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all...

Read More
NEWS
Employees consistently flout security policies, say IT managers

Despite investment in cyber security, employees are still putting organisations at risk,...

Read More
Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack...

Read More
NEWS
Tech giants collaborate on zero outage

Founding Members Brocade, Cisco, Dell EMC, Hitachi Data Systems (HDS), Hewlett Packard Enterprise...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Jon Healy, Regional Strategic Operations Officer at Salute.
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...