Keys and certificates 'chaos'
  • Posted on 9th June 2015 in by Phil Alsop

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT security professionals during the week of April 20th in San Francisco. The survey data reve­als that most IT security professionals acknowledge they don’t know how to detect or remediate quickly...

Read More
Gigamon and JDSU announce integration of Software Defined Visibility APIs
  • Posted on 9th June 2015 in by Phil Alsop

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s breakthrough innovation – Software Defined Visibility, a framework that allows customers, security and network equipment vendors, as well as managed service providers, to control and program...

Read More
Social media - the security risk
  • Posted on 9th June 2015 in by Phil Alsop

New study reveals that social media security is a low priority for organisations and employees are unaware of the risks

Read More
Integrated threat response and intelligence platform
  • Posted on 9th June 2015 in by Phil Alsop

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment time.

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More
Setting the standard for secure managed file transfer analytics and reporting

Ipswitch has announced the release of Ipswitch Analytics, a new reporting and monitoring solution...

Read More
Rapid7 brings Strategic Security Advisory Services to EMEA 

Rapid7will offer its Strategic Advisory Services in EMEA to help security executives and teams...

Read More
NTT Communications to trial enhanced DDoS Defense Orchestrator System

Aims to become Japan's first telecom to provide multihomed anti-DDoS service.

Read More
Scandinavian bank in Lithuania chose Proact for the modernisation of its IT infrastructure

IT infrastructure is one of the key structural components of the bank. It faces continuously...

Read More
Bloxx moves real-time content filtering into the Cloud

Bloxx is to enter the Cloud market with the launch of Tru-View Cloud, a new cloud-based web...

Read More
Bromium enhances endpoint protection

Bromium hasannounced the general availability of Bromium Enterprise Controller (TM) (BEC), a...

Read More
Zero-day attacks pose the biggest threat

Check Point’s research of over 16,000 Security Gateways globally shows targeted attacks and...

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Lorenzo Romano, CEO of GCX Managed Services
By Jon Healy, Regional Strategic Operations Officer at Salute.
By Manvinder Singh, VP of Product Management for AI at Redis.