Panaseer receives funding panacea
  • Posted on 13th November 2015 in by Phil Alsop

Fast-growing cyber security software firm attracts new clients in UK and US.

Read More
Check Point secures Wolverhampton College network
  • Posted on 13th November 2015 in by Phil Alsop

Check Point solution gives college greater control and visibility over network and simplifies security management.

Read More
Achieving compliance objectives
  • Posted on 13th November 2015 in by Phil Alsop

BeyondTrust has introduced the latest version of the company’s privileged password and privileged session management solution, PowerBroker Password Safe 5.7. Users of Password Safe 5.7 will have access to session review enhancements so they can reduce security risks and achieve compliance...

Read More
NEWS
Singapore deploys Gemalto's authentication solution
  • Posted on 12th November 2015 in by Phil Alsop

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides Two-Factor Authentication (2FA) and end-to-end encryption of passwords to secure Singapore Personal Access (SingPass) logins. The authentication solution helps to provide better security for SingPass users...

Read More
Banking on compliance

Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help...

Read More
T-Systems to act as Data Trustee for Microsoft Cloud in Germany

Microsoft has announced plans to make T-Systems, the corporate customer unit of Deutsche...

Read More
Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...

Read More
Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured...

Read More

Videos

Dr. Julia Carpenter, CEO & Cofounder of Apheros, explains how the start-up specialises in thermal management and is developing innovative cooling solutions for data centres and the high-power computing...
In this video we talk to Natal O'Grady from Camfil at DC Ireland 2024
Deborah Garand, Managing Director - High Tech, Accenture, discusses the findings of the company’s recent ‘As a Service, at Your Service’ research report which looks at the challenges and opportunities...
Nicolas Leszczynski, Principal Solution Engineer at Riverbed, discusses the results of the recent Riverbed Global AI & Digital Experience Survey, which finds that organisations are at an inflection point as...

Expert Opinions

By Carsten Ludwig, Market Manager DC, Reichle & De-Massari AG.
By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist – Business and Technology, Trudy Darwin Communications.
By Matt Middleton-Leal, Managing Director Northern Europe, Qualys.
By Liz Centoni, Chief Customer Experience Officer, Cisco.