ServiceNow reinvents security response
  • Posted on 25th February 2016 in by Phil Alsop

ServiceNow is extending its industry-leading automation and orchestration expertise to transform the way organizations respond to threats.  ServiceNow’s first offering, Security Operations, gives both security and IT teams a single platform to respond to security incidents and...

Read More
85% of enterprises keeping sensitive data in the Cloud
  • Posted on 25th February 2016 in by Phil Alsop

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More
Check Point research shows rise in DDoS-related malware
  • Posted on 24th February 2016 in by Phil Alsop

Conficker remains the most active malware family, but malware linked to denial-of-service attacks increased sharply during the month.

Read More
Insurance a critical component of cyber defence strategy
  • Posted on 24th February 2016 in by Phil Alsop

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More
AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to...

Read More
Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...

Read More
Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network...

Read More
50% surge in encrypted traffic

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More
Gemalto releases findings of 2015 Breach Level Index

Theft of identities and personal information retains top spot, accounting for 53% of data...

Read More
prpl Foundation demonstrates security by separation for IoT and other connected embedded devices

The prpl Foundation is demonstrating how an open, hardware based approach provides an ideal...

Read More
Tools4ever introduces IDaaS Cloud solution: HelloID

HelloID combined with Tools4ever’s E-SSOM offers 100 percent single single-on.

Read More
Morgan Lewis expands Global eData Service offerings with EU data centre launch

eData team to host webinar on the current state of EU data privacy law and the firm’s new EU...

Read More
17 per cent of IT managers admit to hacking

Absolute® Software has published the results of a research report the company conducted among...

Read More
CensorNet acquires SMS PASSCODE

Acquisition will accelerate company’s global expansion and seize the market opportunity for a...

Read More
Tripwire debuts Online Security Application Exchange Platform

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...

Expert Opinions

By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.