NEWS
Research reveals Microsoft Teams security and backup flaws
  • Posted on 6th October 2022 in by Phil Alsop

Hornetsecurity has found an urgent need for greater backup for Microsoft Teams, with nearly half of users (45%) sending confidential and critical information frequently via the platform.

Read More
NEWS
Rewrite the identity governance playbook
  • Posted on 5th October 2022 in by Phil Alsop

SailPoint Identity Security Cloud moves beyond governance to deliver world-class innovation, flexibility, and scalability.

Read More
NEWS
Orange Cyberdefense inaugurates its new campus in Toulouse
  • Posted on 5th October 2022 in by Phil Alsop

The Orange group entity dedicated to cybersecurity is setting up in Toulouse to support, in Occitania and New Aquitaine, companies (from very small businesses to large enterprises) and regional public sector players in order to anticipate, analyze and counter cyber threats.

Read More
NEWS
79% of IT leaders see a worrying ‘Protection Gap’
  • Posted on 4th October 2022 in by Phil Alsop

Veeam Software has revealed that UK and Irish businesses are headed for a data protection emergency.

Read More
NEWS
Almost a third of malicious attacks target shadow APIs

Cequence Security has released its first half 2022 report titled, “API Protection Report: Shadow...

Read More
NEWS
LogRhythm introduces cloud-native security operations platform

New LogRhythm Axon’s intuitive analyst experience and enhancements to LogRhythm SIEM, NDR and...

Read More
NEWS
Board members 'unprepared' for cyberattacks

Proofpoint and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, have...

Read More
NEWS
Armadillo partners with Venari Security to raise the curtain on encrypted traffic

The partnership will enable Armadillo’s customers to maintain strong encryption standards, whilst...

Read More
NEWS
Stor.ai teams up with F5

New partnership will allow stor.ai to offer grocers Web Application Firewall (WAF) capabilities to...

Read More
NEWS
'Old-fashioned' authentication still the norm

Majority of employees still rely on username and password authentication.

Read More
NEWS
Illumio Endpoint extends Zero Trust Segmentation

Illumio, Inc., the Zero Trust Segmentation company, has introduced Illumio Endpoint®, a reimagined...

Read More
NEWS
81% of companies had a cloud security incident in the last year

According to new Venafi research, complexity due to increase, as companies plan to host more than...

Read More
NEWS
ThreatQuotient introduces new ThreatQ TDR Orchestrator features

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses...

Read More
NEWS
Paying the ransom is still the most common response to a ransomware attack

Although progress has been made, organisations are still paying out.

Read More
NEWS
Cybersecurity professionals fear severe disruption from CNI cyberattacks

New research from Forcepoint exposes how CNI cybersecurity professionals need greater support to...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Dmitry Panenkov, CEO and founder of emma, the cloud management platform.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.