iSheriff and Soteria Intelligence partner
  • Posted on 16th May 2016 in by Phil Alsop

iSheriff  and Soteria Intelligence have formed a joint partnership to integrate Soteria Intelligence’s leading platform for social media threat assessment into iSheriff Complete, which provides cloud-based security for endpoints, websites and email. The combined offering is...

Read More
Tieto’s Security Services start-up strengthens its services
  • Posted on 16th May 2016 in by Phil Alsop

Tieto’s internal Security Services start-up, launched in January, now strengthens its service portfolio with a Cyber Security Operations Centre and a Security advisory and assessment services to support customers in the midst of increasingly complex security environment and changing...

Read More
Index aids security benchmarking
  • Posted on 16th May 2016 in by Phil Alsop

Online resource behind benchmark survey promises to help companies measure the effectiveness of cybersecurity and share best practices.

Read More
Danish order for Dencrypt
  • Posted on 16th May 2016 in by Phil Alsop

Dencrypt receives order from the Danish Ministry of Defence for encryption technology for classified information.

Read More
NEWS
Putting an end to passwords?

Secure Cloudlink eliminates the need for passwords safeguarding organisations from cyber...

Read More
IT calling for CEOs to be held accountable for data breaches

New research from VMware finds over a quarter (29 percent) of UK IT decision makers state the...

Read More
Only 17 per cent of businesses invest in cyber-security training for staff

The Open University says businesses need to understand the importance of building cyber-security...

Read More
70 percent of Windows environments at risk from malicious attacks

IT admins report heightened interest in visibility: configurations, settings and standards.

Read More
Financial services IT professionals 'overconfident' in breach detection capabilities

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
NEWS
Minority are information governance high performers

Veritas Technologies has released new research findings that illuminate the most effective...

Read More
93 per cent of IT security leaders to maintain or increase Identity and Access Management spending

48 per cent say beating cyber hacking ‘very important’ if digital transformation is to...

Read More
CA Technologies delivers real-time analytics

CA Technologies has introduced the latest release of CA Identity Suite, its leading identity and...

Read More
NEWS
Two thirds of large UK businesses hit by cyber breach or attack in past year

Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.

Read More
Checkmarx partners with WhiteSource

Checkmarx and WhiteSource have formed a partnership, providing Checkmarx users with a comprehensive...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Haris Pylarinos, Founder and CEO of Hack The Box
By Jon Healy, Regional Strategic Operations Officer at Salute.