Imperva acquires data security assets from Camouflage Software

Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk.

Read More
Lastline upgrades

Lastline has introduced its latest enhancements to Lastline Enterprise for Global 5000 companies. The Spring 2017 Release adds capabilities to detect and eliminate browser based-attacks, speed incident investigation for security professionals, and provide early warning of unusual or...

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR) creates more transparency on cyber-security.

Read More
Nordic pioneers join forces

Sofigate and 3gamma, the biggest IT management consulting companies in the Nordics, are joining forces. As Sofigate acquires 3gamma, the joint company will have offices in four countries: UK, Denmark, Sweden and Finland. By 2020, the company is aiming to grow into the leading IT management...

Read More
Aspire stops DDoS attacks

Aspire Technology Solutions has deployed Flowmon Networks' anti-DDoS intelligence to defend...

Read More
NEWS
Greater risk to civil and military global navigation applications in 2017

Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...

Read More
RedSeal extends digital resilience platform

RedSeal has introduced enhancements and new integrations for its market leading network modeling...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
NEWS
F5 introduces comprehensive application security solutions for the digital economy

New solutions give customers the protection and intelligence required to keep applications and user...

Read More
Secure Cloudlink appoints former HPE VP, Lee Hughes, as Chief Sales and Marketing Officer

Cyber security specialist, Secure Cloudlink has appointed former Hewlett Packard Enterprise (HPE)...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Certificate-related outages affect 79 percent of businesses

New study from Venafi finds inadequate cryptographic controls significantly impact reliability...

Read More
Enabling IoT hardware security testing

Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to...

Read More
Intelligent malware prevention just got smarter

Wedge Networks adds cloud-based malware analyzer option to the AI powered Wedge Advanced...

Read More

Videos

Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Kirsty Biddiscombe, EMEA Business Lead AI, ML & Data Analytics, NetApp.
By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.