NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware strains using SSL to encrypt activity.

Read More
NEWS
Data loss is the major Cloud concern

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017 Spotlight Report,” that explores the latest cybersecurity trends and organisational investment priorities among companies in the UK, Benelux and Nordics.

Read More
NEWS
DDoS attacks are longer and 'more demanding'

The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The longest attack in the quarter was active for 277 hours (more than 11 days) – which is a 131 per cent increase compared to Q1. This is so far a record for the year, says the Q2 2017 botnet DDoS...

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments.

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT...

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
NEWS
Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of...

Read More
NEWS
DDoS attacks on the increase

Financially motivated DDoS attacks driven by criminal extortion have garnered security...

Read More
NEWS
McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More
Making a drama out of security

Forcepoint Cloud Security enhances process, people and technology readiness to combat ransomware...

Read More
IT teams and the C-suite must work together to deliver comprehensive cyber-security

Cyber-security is rarely out of the news these days, with large businesses and organisation...

Read More

Videos

Dr Chris Ballance, co-founder and CEO of Oxford Ionics, explains how the company has developed and proven the building blocks of a high-performance, scalable quantum computer, and has also demonstrated that...
Dor Eisner, CEO and Co-Founder of Guardz. Discusses the launch of the company’s new, free Community Shield plan for MSPs. The offering is designed to help MSPs secure and insure their internal operations,...
Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the first ever World Quantum Readiness Day – detailing the very real threat that quantum computing could...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...

Expert Opinions

Relocation and replacement of cooling infrastructure on mission critical live data centre.
By Michelle Would, Director of Customer Experience at Agilitas IT Solutions.
By Brandon Green, Senior Solutions Architect & Threat Modeling SME, IriusRisk.