Splunk expands Adaptive Response Initiative

Splunk has expanded the Adaptive Response Initiative. The initiative, announced earlier this year, brings together leading vendors, leveraging end-to-end context and automated response to help organizations better combat advanced attacks through a unified defense. Acalvio, Anomali, Cisco,...

Read More
NSFOCUS introduces STAR Partner Programme

NSFOCUS, a global provider of intelligent hybrid security solutions, has launched its global partner programme, the NSFOCUS STAR Partner Programme. The program encompasses partners at the regional and national levels including resellers, distributors, consulting partners, technology and...

Read More
Atera partners with Webroot

Atera, developer of the cloud-based IT automation platform that combines Remote Monitoring and Management (RMM software), Professional Services Automation (PSA), and remote access into one powerful solution, has partnered with Webroot, the market leader in next-generation endpoint security and...

Read More
Positive Technologies and Check Point partner

Positive Technologies and Check Point Software Technologies have established a technological alliance to create an integrated approach to corporate network perimeter and web resources security. The partners have released a joint solution that integrates PT Application Firewall and Check...

Read More
Skyhigh Networks secures $40 million in Series D funding

Skyhigh Networks, the Cloud Access Security Broker (CASB), todayhas announced a $40 million...

Read More
FireMon welcomes new President & CEO, Satin H. Mirchandani

High-growth security management vendor forges ahead with new CEO at the helm.

Read More
The buck for cyber security resides in the boardroom

Non-executive directors must speak the language of IT security to mitigate the threat of data...

Read More
NEWS
Cyber security awareness rises, yet bad habits persist

While 82 percent of respondents believe the IT security industry is making progress against cyber...

Read More
Technology is only half of the battle for GDPR compliance

Businesses must not forget the importance of culture as the General Data Protection Regulation...

Read More
IoT devices increasingly used to carry out DDoS attacks

Symantec has revealed new research demonstrating how cybercriminal networks are taking advantage...

Read More
BeyondTrust introduces free API for password management

Offers developers flexibility and security by eliminating hard-coded passwords.

Read More
Cloud Distribution appointed as A10 Networks’ approved training partner

Cloud Distribution, a next generation value-added distributor specialising in security,...

Read More
ThreatConnect adds orchestration to its intelligence platform

With orchestration, ThreatConnect customers may bridge security teams, tools, processes,...

Read More
Helping to secure the Everywhere Perimeter

Avaya is announcing a new foundation approach to network security that aims to reduce the growing...

Read More
NEWS
Malware mayhem

Phishing attacks continue to rise in volume and impact in 80 percent of businesses surveyed, with...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Will Morey, Managing Director at Gamma, explains why PSTN migration is a scale problem for MSPs, not a technical one. He shows how structured journeys, partner support, and integrated platforms turn forced...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...

Expert Opinions

By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Mala Pillutla, Vice President of Sales for Log Management, Dynatrace.
By Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres.