NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation...

Read More
NEWS
Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise...

Read More
NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...

Read More
NEWS
How unguarded privileged access can turn a breach into a catastrophe

It has become increasingly accepted by many organisations that a security breach, in some form or...

Read More
NEWS
A flexible approach to privacy

The ongoing impact of GDPR, by Dan Harding, Director, Sign In App.

Read More
Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More
Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon...

Read More
Tackling poor password hygiene habits head-on

Alvaro Hoyos, Chief Information Security Officer at OneLogin.

Read More
Threat analytic services on-demand have arrived

By Christopher Steffen, CISSP, CISA, Technical Director.

Read More
2018 will be the Year of Automation when ‘big, bad attacks’ will target automated technology processes

Carl Herberger, vice president of security solutions at Radware, has made his top three ...

Read More
2018 predictions - from cryptocurrency mining to ‘fileless’ attacks

By Travis Farral, Director of Security Strategy at Anomali.

Read More

Videos

Dr Chris Ballance, co-founder and CEO of Oxford Ionics, explains how the company has developed and proven the building blocks of a high-performance, scalable quantum computer, and has also demonstrated that...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...
Eric Herzog, Infinidat CMO, outlines the company’s recent technology launch – the InfiniBox G4 family of cyber secure storage arrays, which incorporates InfiniSafe, InfiniVerse and Storage as a Service...
Ben Pritchard, CEO of AVK, a fast-growing supplier of innovative and sustainable power solutions for data centres and energy-intensive organisations both here and in Europe, discusses how the data centre...

News

Ataccama, an AI-powered data management company, has launched a new partner program for solution partners to enable them to provide customers with bespoke accredited services, enabling them to scale their data...
Dell extends collaboration with NVIDIA to transform telecom network operations with AI solutions, built on the Dell AI Factory with NVIDIA.
Focused on business innovation and its dedication to channel strategy, Vectra AI enhances its program offerings for the MSSP community to help partners deliver best-in-class XDR solutions.
Jamf has enhanced its leadership team with two key new hires: Andrew Smeaton as Chief Information Security Officer and Marc Botham as Global Vice President of Channel and Alliances.