Cybersecurity certification program

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for customers, partners and employees of SecureAuth. Through eLearning and instructor-led courses, SecureAuth University offers certification for three levels of cybersecurity professionals:...

Read More
White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the cloud to data centre operators. The obvious benefits of maximum uptime with minimal overhead and improved efficiency are nevertheless offset by the threat of such systems being used as an avenue...

Read More
Only 8% of Asian nations are safe for data privacy

Only four Asian nations are considered truly secure for data storage, according to a new report by secure data centre Artmotion. Combining independent data from the United Nations, World Economic Forum, Transparency International and several other leading privacy groups, the report titled Data...

Read More
BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for addressing the challenges of privileged access management.

Read More
NEWS
Data theft rising sharply

Three out of every four organisations have been hit by the loss or theft of important data over...

Read More
DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to...

Read More
Now available: ThreatConnect powered by SAP HANA

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More
CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically...

Read More
BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies,...

Read More
A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity...

Read More
Gigamon fortifies security analytics with certificate metadata

Gigamon’s metadata generation engine enables faster detection of attacks that leverage falsified...

Read More
Faster, more resilient vulnerability assessment

Tripwire has introduced that the most recent version of Tripwire® IP360TM now distributes...

Read More
Allot launches new security solution in collaboration with Intel Security

McAfee Unified Security Powered by Allot delivers comprehensive, yet simple, service that...

Read More
Tripwire launches Tripwire Enterprise 8.5 agent on Axon

New technology revolutionizes endpoint data collection for cyber security, compliance and IT...

Read More
Analysing ransomware behaviour

CyberArk has released new ransomware research from CyberArk Labs. More than 23,000 real-world...

Read More

Videos

CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...

Expert Opinions

By Peter Miller, sales manager and refurbished technology expert, at ETB Technologies.
By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
By Jon Fielding, Managing Director, EMEA, Apricorn.
By Graham Jarvis, Freelance Business and Technology Journalist.