Enabling secure access for hybrid IT environments

Pulse Secure has introduced new solutions to allow enterprises to embrace cloud delivered apps and data in order to increase worker productivity without sacrificing security.

Read More
Tenable Network Security launches Technology Integration Partner Program

Tenable levels-up its global technology integrations program with launch partners Amazon Web Services, CyberArk, FireEye and Gigamon to speed innovation and deliver holistic security to customers.

Read More
Trustwave appoints Chief Operations Officer

Trustwave has appointed security industry veteran Rick Miller as Chief Operations Officer, a newly created role that leads the company’s portfolio of professional, delivery and managed services.

Read More
Improving incident response effectiveness

CyberArk has introduced new real-time threat detection and containment capabilities to help organisations secure against cyber attacks targeting Microsoft Active Directory infrastructure. Compromising Active Directory empowers attackers to take control of the business.

Read More
Check Point unveils management platform

New R80 security platform helps organizations to better consolidate processes, policies and...

Read More
10 Networks launches standalone Thunder SSL Insight (SSLi) line of products

A10 Networks has launched the Thunder SSL Insight (SSLi), a standalone security product built on...

Read More
BT and Intel Security collaborate to develop next generation security services

BT and Intel Security have formed a strategic agreement to create new solutions to help...

Read More
Immune system fights back

Darktrace has launched Darktrace Antigena, a ground-breaking new product that uses machine...

Read More
NEWS
Turning security intelligence into protection

Companies need more than endpoint protection to stay secure in an increasingly complex...

Read More
IoT encryption and authentication

Cryptosoft to leverage Symantec’s Roots of Trust and device certificates to secure IoT devices.

Read More
Advancing sandboxing beyond threat detection

Industry-first, multi-engine approach to advanced threat analysis—that also supports...

Read More
Ensuring email security and compliance

Fidelis email security for Office 365 ensures email security and compliance with improved...

Read More
Open Threat Exchange update

AlienVault has introduced a new, enhanced version of Open Threat Exchange™ (OTX), its open...

Read More
Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

Read More
Fortinet launches Cyber Threat Assessment Program

Analysis of enterprises piloting the program shows that social media and application control...

Read More

Videos

Alkesh Soneji, Director - Sales & Marketing, Infrassist, discusses the problems facing SMB MSPs as they are often too busy ‘keeping the lights on’ to be able to devote enough time an effort into growing...
Steve Young, UK SVP and MD, Dell Technologies, explains how can businesses can navigate the high upfront cost of AI while aiming for cost-saving and efficiencies, the importance of adopting an 'AI-first'...
Gartner’s leading cybersecurity analysts, Michael Kranawetter and Jie Zhang, discuss the findings of two recent research reports – the Hype Cycle for Cyber-Risk Management, 2024 and the Hype Cycle for...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...

Expert Opinions

By Shaked Reiner, Principal Cyber Researcher, CyberArk Labs.
By Richard Connolly, Regional Director for UKI at Infinidat.
By Yiannis Antoniou, Head of Data, AI, and Analytics at Lab49.
By Mark Gilliland, Director at Cloudhouse.