Achieving compliance objectives
  • Posted on 13th November 2015 in by Phil Alsop

BeyondTrust has introduced the latest version of the company’s privileged password and privileged session management solution, PowerBroker Password Safe 5.7. Users of Password Safe 5.7 will have access to session review enhancements so they can reduce security risks and achieve compliance...

Read More
NEWS
Singapore deploys Gemalto's authentication solution
  • Posted on 12th November 2015 in by Phil Alsop

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides Two-Factor Authentication (2FA) and end-to-end encryption of passwords to secure Singapore Personal Access (SingPass) logins. The authentication solution helps to provide better security for SingPass users...

Read More
Banking on compliance
  • Posted on 12th November 2015 in by Phil Alsop

Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help Rabobank, a Dutch multinational banking and financial services company headquartered in Utrecht, the Netherlands, control its data access and permissions and enable regulatory compliance.

Read More
T-Systems to act as Data Trustee for Microsoft Cloud in Germany
  • Posted on 12th November 2015 in by Phil Alsop

Microsoft has announced plans to make T-Systems, the corporate customer unit of Deutsche Telekom, the German Data Trustee for its new Microsoft Cloud offer in Germany. Microsoft will offer Azure, Office 365 and Dynamics CRM Online from two datacenters in Germany under a unique model that...

Read More
Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...

Read More
Cyber attacks becoming automated and 'industrialised'

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More
Twistlock strengthens container security

Twistlock has announced the general availability of the Twistlock Container Security Suite and a...

Read More
Quarter of UK businesses wide open to email security breach

25 per cent of businesses currently have no email security solution in place.

Read More
Flexera launches Vulnerability Intelligence Manager 2016

Enhanced product extends businesses’ ability to manage and control software vulnerability...

Read More
NEWS
Protonmail chooses attack mitigation system

Radware has been appointed by ProtonMail to help it fight back on the cyber attacks it has endured...

Read More
Tenable Network Security raises $250 million

Series B funding led by Insight Venture Partners and Accel will help accelerate development of the...

Read More
UK’s leading conveyancer chooses Databarracks for disaster recovery

myhomemove selects Databarracks to implement DRaaS offering.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
By Lorenzo Romano, CEO of GCX Managed Services
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.