A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small...

Read More
ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches.

Read More
AlienVault appoints Catherine Kelly as VP of EMEA Sales

Catherine Kelly has joined AlienVault as Vice President of Sales to expand its business in Europe, Middle East and Africa. In this role, the former FireEye vice president will be responsible for growing AlienVault’s EMEA business, including partner and customer relationships.

Read More
Encode helps the University of Aberdeen strengthen security

Two week project streamlines security processes and enables detection of brute force and subtle...

Read More
Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet...

Read More
A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives...

Read More
Kraynak joins Imperva

Mark Kraynak has been appointed Imperva’s Senior Vice President and General Manager of the...

Read More
NEWS
Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company...

Read More
Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural...

Read More
PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More
Preventing data exfiltration in real time

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data...

Read More
Resilient Systems joins IBM Security App Exchange community

Resilient Systems Incident Response Platform is part of collaborative development to stay ahead of...

Read More
Exostar launches Cybersecurity Risk Assessment Solution

Exostar has introduced the  Partner Information Manager (PIM), a new, modular solution...

Read More
Tufin appoints Sales Vice President for EMEA

Tufin has appointed Ian Rigby as Vice President of Sales for the EMEA region. Based...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Manvinder Singh, VP of Product Management for AI at Redis.
By Mala Pillutla, Vice President of Sales for Log Management, Dynatrace.