Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More
Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks...

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make...

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More
Innovative ICT infrastructure is the foundation of a better connected smart nation

Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.

Read More
FortyCloud available IBM’s Cloud Marketplace

FortyCloud for IBM provides an extensive security solution to assist IBM Cloud customers meet...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More

Videos

Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...

Expert Opinions

TES Power’s Managing Director, Michael Beagan explores the top five power challenges the data centre industry may face in 2026, in light of the surge in AI. With a huge increase in demand, power is becoming...
By Jon Fielding, Managing Director, EMEA, Apricorn.
AI’s true value starts with the right mindset. By Darin Patterson, VP of Market Strategy Make.
By David Trossell, CEO and CTO of Bridgeworks.