End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy...

Read More
Playing it safe in the Cloud

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell,...

Read More
ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More
Skyhigh reveals Pervasive Cloud 'secrets'

 Skyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.

Read More
Trustwave and Palo Alto Networks forge Managed Security Services pact

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation...

Read More
Rapid7 introduces Nexpose 6.0 with adaptive security

Rapid7, Inc. has released Nexpose 6.0 featuring Adaptive Security, a new capability that will...

Read More
Protecting your business against a DDoS attack  

By Wieland Alge, VP and GM, EMEA at Barracuda Networks.

Read More
ANSecurity and Pulse Secure partner to offer leading industry secure access solutions

Leading network security firm ANSecurity has been awarded key partner status with secure access...

Read More
The Internet of Things Security Foundation has launched  

Welcomes new members to drive IoT security excellence.

Read More
Human error still the leading cause of data loss for UK organisations in 2015

Adopting a big business ethos can significantly reduce avoidable data losses says Databarracks

Read More
US IT professionals less confident in board level cybersecurity literacy than UK counterparts

Tripwire has published the results of a study conducted by Dimensional Research on the...

Read More
Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and...

Read More
Tripwire introduces three new Tripwire apps  

Industry leader delivers add-on tools to improve workflow efficiency.

Read More
Check Point and AirWatch partner

Check Point Software Technologies has joined the AirWatch® Mobile Security Alliance as a...

Read More

Videos

Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
In this interview, Melanie Douglas, Sales Manager EMEA & Global Partner Program Manager, discusses how the company is evolving its Microsoft 365 migration expertise into AI readiness, governance, and Copilot...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...

Expert Opinions

Why water quality has become a defining variable in AI-era data center commissioning By Jacob Paugh, Senior Director of Global High Tech at ChemTreat.
By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.
By Iain Bowes, Head of Management Systems Assurance for TÜV SÜD Business Assurance, a global provider of auditing and certification services that help organisations to gain in-depth insights of how corporate...
By Rohit Gupta, UK&I Managing Director at Cognizant.