Cybersecurity certification program

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for customers, partners and employees of SecureAuth. Through eLearning and instructor-led courses, SecureAuth University offers certification for three levels of cybersecurity professionals:...

Read More
White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the cloud to data centre operators. The obvious benefits of maximum uptime with minimal overhead and improved efficiency are nevertheless offset by the threat of such systems being used as an avenue...

Read More
Only 8% of Asian nations are safe for data privacy

Only four Asian nations are considered truly secure for data storage, according to a new report by secure data centre Artmotion. Combining independent data from the United Nations, World Economic Forum, Transparency International and several other leading privacy groups, the report titled Data...

Read More
BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for addressing the challenges of privileged access management.

Read More
NEWS
Data theft rising sharply

Three out of every four organisations have been hit by the loss or theft of important data over...

Read More
DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to...

Read More
Now available: ThreatConnect powered by SAP HANA

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More
CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically...

Read More
BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies,...

Read More
A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity...

Read More
Gigamon fortifies security analytics with certificate metadata

Gigamon’s metadata generation engine enables faster detection of attacks that leverage falsified...

Read More
Faster, more resilient vulnerability assessment

Tripwire has introduced that the most recent version of Tripwire® IP360TM now distributes...

Read More
Allot launches new security solution in collaboration with Intel Security

McAfee Unified Security Powered by Allot delivers comprehensive, yet simple, service that...

Read More
Tripwire launches Tripwire Enterprise 8.5 agent on Axon

New technology revolutionizes endpoint data collection for cyber security, compliance and IT...

Read More
Analysing ransomware behaviour

CyberArk has released new ransomware research from CyberArk Labs. More than 23,000 real-world...

Read More

Videos

John Booth, MD of Carbon3IT, explains the thinking behind the new National Data Centre Academy, as part of his company’s commitment to decarbonising ICT estates across the globe, by providing training in...
Hugo Bishop, Regional Sales Director - Northern Europe, Stellar Cyber, explains how MSSPs need to ensure that their SOC platform is designed to address the many, constantly evolving cybersecurity challenges...
Dr Chris Ballance, co-founder and CEO of Oxford Ionics, explains how the company has developed and proven the building blocks of a high-performance, scalable quantum computer, and has also demonstrated that...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...

Expert Opinions

By James Fisher, Chief Strategy Officer, Qlik.
By Mark Gilliland, Director at Cloudhouse.
By Michelle Would, Director of Customer Experience at Agilitas IT Solutions.