The 'outside' insider threat
  • Posted on 7th October 2015 in by Phil Alsop

61 percent cite privileged account takeover as most difficult cyber attack stage to mitigate; 44 percent still believe they can prevent attackers from breaking into a network.

Read More
Code42 secures $85 million in funding
  • Posted on 6th October 2015 in by Phil Alsop

Code42 has secured $85 million in Series B funding led by new investors JMI Equity, a growth equity firm focused on investing in leading software and services companies, and global venture capital firm New Enterprise Associates, Inc. (NEA).

Read More
Cybercrime is a 'grave threat' to the economy and law enforcement
  • Posted on 6th October 2015 in by Phil Alsop

Research produced for the City of London Corporation and supported by the City of London Police has shed light on the severity of economic cybercrime, with the data illustrating the scale of the issue affecting businesses and individuals. 

Read More
Nuix promotes international cybersecurity adviser Stuart Clarke to cyber-CTO
  • Posted on 6th October 2015 in by Phil Alsop

Nuix, a company that protects, informs, and empowers society in the knowledge age, today promoted internationally respected information security expert Stuart Clarke to the role of Chief Technology Officer for Cybersecurity.

Read More
Digital Guardian acquires Code Green Networks

Digital Guardian, the endpoint security platform purpose- built to stop data theft, has...

Read More
Vormetric strengthens EMEA Channel

Ex-Fortinet Global Account Director, Chris Smith, joins encryption leader to drive and grow channel...

Read More
Software-defined security solutions unveiling

Certes Networks says that its CryptoFlow product suite now protects enterprise applications in...

Read More
Businesses feel the EU Data Protection burden

Over two thirds of IT professionals say they need to invest in new technologies or services to...

Read More
Businesses risk losing customers

The Ponemon Institute and Venafi have released new data from the 2015 Cost of Failed Trust Report,...

Read More
FireEye and F5 announce global partnership

Strategic alliance combines advanced application delivery technologies with sophisticated threat...

Read More
Nuclear attack security risk is growing

The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become...

Read More
End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first...

Read More
Playing it safe in the Cloud

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be...

Read More
ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will...

Read More
Skyhigh reveals Pervasive Cloud 'secrets'

 Skyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
DCW Asia 2025 - Part 2 of 3
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

Expert Opinions

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
By Lorenzo Romano, CEO of GCX Managed Services