Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network.

Read More
Nutanix launches Acropolis and Prism

Nutanix has unveiled its next-generation Xtreme Computing Platform (XCP) to deliver invisible...

Read More
Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...

Read More
Gigamon and JDSU announce integration of Software Defined Visibility APIs

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s...

Read More
BT secures cloud services integration offering with Check point software technologies

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More
Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...

Read More
NEC awards Top Performers at NEC EMEA Partner Conference 2015

Conference celebrates sales success and radiates commitment to company’s strategy and...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
DCW Asia 2025 - Part 2 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

Andrew Winters, executive vice president- managed detection and response from Obrela discusses the telecoms industry’s distinctive cyber threat profile
By Chris Ackerson, SVP of Product at AlphaSense.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.