Imperva acquires Tomium Software assets

Imperva, Inc. has acquired real-time mainframe security auditing agents from Tomium Software.

Read More
Hogarth Worldwide erweitert mit Level 3 transkontinentales Content Sharing sowie die Sicherheit und Speicherung von Werbeinhalten

Das zum WPP-Konzern gehörende Unternehmen wählt Level 3 um seinen Produktionsteams den Austausch und die Lokalisierung von mehreren Terabytes an Video- und anderen Digitalinhalten zu ermöglichen

Read More
Palo Alto Networks launches the industry’s ‘fastest’ next-generation firewall

Palo Alto Networks® has announced what it says is the industry’s most powerful next-generation firewall, the PA-7050. With next-generation firewall functions, such as full application enablement, IPS, AV and WildFire™ active on all traffic, the PA-7050 delivers consistent...

Read More
Citrix and Palo Alto Networks team

Citrix has announced the immediate availability of the Palo Alto Networks VM-Series, a next-generation virtualized firewall and threat prevention offering, on the Citrix® NetScaler® SDX™ service delivery networking platform. This industry-first integration allows customers to use a...

Read More
Are workers getting away with more on personal devices?

By Steve Hammond, President of Fiberlink International.

Read More
Big Data security analytics predicted to grow

Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...

Read More
Survival and success of UK SMBs tied to non-licenced technology

CEOs must empower IT managers to make the right decision for the business.

Read More
IBM brings Watson to Africa

IBM has launched a 10-year initiative to bring Watson and other cognitive systems to Africa in a...

Read More
Datenklau bei Yahoo! – Wie Nutzer und Unternehmen sich schützen sollten

Yahoo! hat seine Nutzer angewiesen, ihre Passwörter zu ändern, nachdem es durch eine...

Read More
HP-Studie: Gut 80 Prozent aller Anwendungen mit Sicherheitslücken

Neuer "HP Cyber Risk Report" analysiert Schwachstellen in der...

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the...

Read More
OneLogin launches European service for Cloud Identity Management

OneLogin has launched a European service to provide cloud-based Identity and Access Management...

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal...

Read More
Silver Peak Accelerated IPsec: Kostenloser Schutz gegen Datendiebstahl

AES-Verschlüsselung mit 256-Bit-Keys für Site-to-Site-VPNs in Verbindung mit...

Read More
Improvements to Akamai Kona Site Defender

Combination of data from Akamai Intelligent Platform and new testing framework improves security...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
DCW Asia 2025 - Part 1 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Manvinder Singh, VP of Product Management for AI at Redis.
By Chris Ackerson, SVP of Product at AlphaSense.