Nexsan adds Web browser access
  • Posted on 19th February 2016 in by Phil Alsop

Nexsan says that its family of Transporter private cloud file sync and share appliances, now offers secure data access via industry standard Web browsers.

Read More
NEWS
Borica-Bankservice selects Vormetric
  • Posted on 18th February 2016 in by Phil Alsop

Vormetric has published details of a new deployment of data encryption solutions for Borcia-Bankservice in Bulgaria.

Read More
Firewall innovations
  • Posted on 17th February 2016 in by Phil Alsop

As global companies embrace new digital business opportunities, cybersecurity is regularly cited as a top concern impeding growth and innovation. To give businesses the confidence to pursue digital opportunities to enable growth, Cisco has made security a top priority and is today announcing...

Read More
Gemalto launches M2M Cat 1 LTE module
  • Posted on 16th February 2016 in by Phil Alsop

Gemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced module enables fall-back to 2G in Europe Middle East Africa and to 3G in North America for areas where LTE connectivity is not yet fully available.

Read More
NEWS
Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and...

Read More
IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
Tieto adds Finnish start-up CySec to Security Services ecosystem

Tieto's Security Services start-up is initiating collaboration with CySec Ice Wall Oy (CySec),...

Read More
Bromium introduces next-generation endpoint protection software solution

Bromium has launched Bromium Advanced Endpoint Security, which integrates endpoint threat...

Read More
Zscaler expands partner ecosystem

Zscaler has expanded its open partner ecosystem to include Cloud Application Security Brokers...

Read More
NEWS
Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house...

Read More
Infoblox acquires IID

Removes obstacles to effective protection, without requiring major infrastructure investments.

Read More
Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure...

Read More
Check Point extends zero-day security to endpoints

SandBlast Agent integrates new protections and advanced forensics to secure endpoint devices and...

Read More
Data residency is just a small piece of the EU-US Privacy Shield puzzle

So Safe Harbour is no more. It was announced last week that after months of negotiations, the...

Read More
Thycotic names Simon Azzopardi Vice President of EMEA

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500...

Read More

Videos

Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Haris Pylarinos, Founder and CEO of Hack The Box
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Lorenzo Romano, CEO of GCX Managed Services
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.