Ex-employees have access to confidential data up to a week or more after leaving a company

One in three say it is ‘easy’ for ex-employees to access systems or information with old passwords.

Read More
Check Point teams with VMware

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention for all data centre traffic.

Read More
Organisations spend half a million pounds, annually, dealing with false positive alerts

A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence. The report found that teams spend, on average, 272 hours each week responding to ‘false positive’ cyber alerts –...

Read More
NTT Com Security and Fortinet form global security partnership

NTT Com Security and Fortine have entered into a formal partnership to provide expert security...

Read More
Bromium will enhance Windows 10’s Advanced Security with micro-virtualization

Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10,...

Read More
DDoS attacks damage customer confidence and revenues

More than half of IT security professionals (52 percent) said loss of customer trust and confidence...

Read More
Palo Alto Networks, Cisco and Dell are top vendors for intrusion detection and prevention

AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...

Read More
Fortinet closes acquisition of Meru Networks

Fortinet has closed the acquisition of Meru Networks. With the close of this acquisition, Fortinet...

Read More
Defence driven by understanding the attacker’s mindset

MWR InfoSecurity launches Countercept service – to catch a thief it has to think like one.

Read More
How to be a security policy management saint, not a sinner

The path to policy righteousness demands the right processes, visibility and automation – but...

Read More
Bitdefender signs MSP partnership deal with Blue Solutions

Security solutions provider has joined forces with established software distributor to protect...

Read More
Bolstering enterprise visibility into threats and vulnerabilities

Trustwave has carried out a major enhancement to the company’s managed security services...

Read More
Etihad Airways chooses Okta to provide Identity Management Services in the cloud

Etihad Airways makes significant technology investment with Okta to drive innovation through...

Read More
Small businesses in the dark about cyber security

More than half of small businesses in the UK are unprepared for data breaches, CSID survey finds...

Read More

Videos

Ivana Bartoletti, Global Chief Privacy and AI Governance Officer at Wipro, also a Council of Europe adviser on AI and human rights, provides some fascinating insights into the EU AI Act, the UK’s upcoming AI...
Daniel Thorpe, Associate Director of Data Centre Research at JLL, explains the reasons behind the edge data centre market’s predicted doubling by 2026 – with data regulation, low latency demand and IoT...
Erik Nicolai, CEO of Workspace 365, discusses the building blocks of a digital workplace, and more general digital transformation, strategy, highlighting the challenges to be overcome – such as complexity,...
Fevzi Konduk, EMEA Head of Software and ISV partners at Red Hat, explains Red Hat how the company’s ongoing work to transform the global partner engagement experience and offer greater simplicity, choice and...

Expert Opinions

By Shaked Reiner, Principal Cyber Researcher, CyberArk Labs.
By Dennis Frank, Vice President, EMEA Strategic Partners & Alliances and EMEA Inside Sales.
By Richard Connolly, Regional Director for UKI at Infinidat.