NEWS
Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More
Fortinet delivers third generation of network security

FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security operations and protect the digital attack surface.

Read More
Splunk agrees to acquire Phantom

Splunk Inc. is to acquire Phantom Cyber Corporation, a leader in Security Orchestration, Automation and Response (SOAR).

Read More
NEWS
du selects Fortinet

UAE-based telecommunications service provider du – from Emirates Integrated Telecommunications Company (EITC), has selected Fortinet Security Fabric solutions as the foundation of its Cloud Unified Threat Management (UTM) managed security services, designed for Enterprise broadband...

Read More
NEWS
CrowdStrike Global Threat Report reveals the biggest cyber crime and targeted intrusion trends

Following the trickle-down effect of advanced ‘military-grade’ tools, report uncovers...

Read More
NEWS
Shop Direct automates cyberattack detection with Vectra

The United Kingdom’s second-largest pureplay digital retailer uses artificial intelligence to...

Read More
NEWS
Email attacks continue to cause headaches

Over one-third of all security incidents start with phishing emails or malicious attachments sent...

Read More
NEWS
Security threats - beyond the reach of humans?

Cisco 2018 Annual Cybersecurity Report reveals that 39 percent of organizations are reliant on...

Read More
NEWS
Costs not customers the major security breach concern

Sixty-three per cent of C-suite more concerned about paying for the costs of a cybersecurity...

Read More
Attacks per firm increase by 82%

Fortinet has published the findings of its latest Global Threat Landscape Report. The...

Read More
NEWS
The Bunker delivers ultra secure hosting without breaking the bank

A10 Networks’ Application Delivery Controllers (ADCs) ensure that The Bunker’s data centre...

Read More
Risk reporting to improve digital defence

Leader in digital threat management expands Digital Footprint product to cover enterprise risk...

Read More
Quick quantum

Toshiba Europe GmbH has developed what it says is the world's fastest quantum key distribution...

Read More
NEWS
The seven steps of security

Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing...

Read More
NTT Security and ThreatQuotient partner

Collaboration will deliver enhanced threat intelligence capabilities to worldwide managed security...

Read More

Videos

Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the first ever World Quantum Readiness Day – detailing the very real threat that quantum computing could...
Erik Nicolai, CEO of Workspace 365, discusses the building blocks of a digital workplace, and more general digital transformation, strategy, highlighting the challenges to be overcome – such as complexity,...
Steve Young, UK SVP and MD, Dell Technologies, explains how can businesses can navigate the high upfront cost of AI while aiming for cost-saving and efficiencies, the importance of adopting an 'AI-first'...
Gartner’s leading cybersecurity analysts, Michael Kranawetter and Jie Zhang, discuss the findings of two recent research reports – the Hype Cycle for Cyber-Risk Management, 2024 and the Hype Cycle for...

Expert Opinions

By Richard Connolly, Regional Director for UKI at Infinidat.
As data centres evolve to meet the demands of high-speed data transmission, the role of optical devices becomes increasingly critical. The efficient conversion of electrical and optical signals necessitates...
By Brandon Green, Senior Solutions Architect & Threat Modeling SME, IriusRisk.
By Tamar Brooks, Managing Director, UK&I, Broadcom.