Automating network vulnerability detection and security policy enforcement

SolarWinds has introduced enhancements to SolarWinds Network Configuration Manager (NCM), its network device configuration and change management product for Cisco, Juniper, HP, Dell, and Brocade routers and switches and any other device with a command line interface.

Read More
Cisco embeds security everywhere

Cisco has introduced new offerings to embed security throughout the extended network – from the data center out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control. By integrating security everywhere, enterprises and service providers gain the...

Read More
Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network.

Read More
Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...

Read More
Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are...

Read More
Gigamon and JDSU announce integration of Software Defined Visibility APIs

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s...

Read More
BT secures cloud services integration offering with Check point software technologies

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More
Setting the standard for secure managed file transfer analytics and reporting

Ipswitch has announced the release of Ipswitch Analytics, a new reporting and monitoring solution...

Read More
Rapid7 brings Strategic Security Advisory Services to EMEA 

Rapid7will offer its Strategic Advisory Services in EMEA to help security executives and teams...

Read More

Videos

Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...
Andy Venables, CEO at POPX, discusses the findings of a new survey of 250 MSP leaders by POPX, which reveals a significant shift in expectations for MSPs in 2026. Unsurprisingly, security and AI featured...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

By Orla Daly, Chief Information Officer at Skillsoft.
By David Davies, Associate Director at Arup.
By Dave Adamson, Solutions Director at Creative ITC.
TES Power’s Managing Director, Michael Beagan explores the top five power challenges the data centre industry may face in 2026, in light of the surge in AI. With a huge increase in demand, power is becoming...