Thales launches Cyber and Consulting Services organisation
  • Posted on 15th June 2016 in by Phil Alsop

Thales has launched a Cyber and Consulting organisation which will provide customers with consulting services in digital transformation and cybersecurity.

Read More
Proofpoint expands partner ecosystem with CyberArk and Imperva
  • Posted on 15th June 2016 in by Phil Alsop

Seamless integrations protect privileged users faster, prevent data breaches.

Read More
Prioritising and streamlining security operations
  • Posted on 14th June 2016 in by Phil Alsop

Tenable delivers improved security visibility and critical context to help security teams remediate vulnerabilities and mitigate security threats.

Read More
Providing security automation at scale for Linux
  • Posted on 14th June 2016 in by Phil Alsop

Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems.

Read More
DNS attacks costing businesses more than $1 million

But almost 30 per cent of organisations still don’t rate DNS as an important part of their...

Read More
Proofpoint introduces eDiscovery Analytics

eDiscovery Analytics empowers legal teams with proactive litigation readiness to control cost and...

Read More
ManageEngine adds SSL Certificate Management to its Privileged Identity Management Suite

ManageEngine has introduced SSL certificate management support in Key Manager Plus,...

Read More
Security and speed are the main barriers to a connected workforce

A survey conducted by Nexsan has revealed that data security and download speeds were the...

Read More
NEWS
Over a third of organisations are yet to develop a cyber-attack response plan

Lack of preparation by businesses alarming due to multi-faceted threat landscape.

Read More
Proofpoint delivers threat context into Splunk software

Multiple technology integrations enable Proofpoint email and social media context to be easily...

Read More
A clouded security picture?

Blue Coat Systems has revealed the initial results from an online study conducted by YouGov of...

Read More
An appetite for risk?

New paper highlights ability to quantify and manage cyber risk appetite could determine...

Read More
New accredited standards will need to follow establishment of GDPR

Standards must be driven by real world and not by lawyers and policy makers.

Read More
Chemring launches 'world’s first AI cyber security system'

Chemring Technology Solutions has launched ForensicAI, an advanced system of artificial...

Read More
NEWS
Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

By Manvinder Singh, VP of Product Management for AI at Redis.
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.