Featured

AI-Native Edge: Juniper Networks Vision of Networking

Juniper Network is aiming to offer visibility across network and security operations with its new Secure AI-Native Edge solution

DNV & CyberOwl Join to Give Shipping Huge Cyber Offering

This partnership brings compliance management and cybersecurity protection to the increasingly digitally operated shipping industry

Operational Security

AI & Automation: Nokia Report Shows Growth in Complex DDoS

Nokia's latest Threat Intelligence Report unravels the escalating cyber threats facing digital infrastructures, highlighting the crucial role of AI and IoT

Cyber Security

Why is Active Directory a Concern for CISOs?

Jim Doggett, CISO at Semperis, explains why Active Directory is worrying CISO’s, the consequences of it and how it can be secured to prevent cyber attacks

Cyber Security

Cloudflare: Lessons From Halting the World's Biggest DDoS

Cyber Security

Ken Xie: A Masterclass in Cybersecurity Excellence

Cyber Security

Interviews

View all
Featured

Janis Lasmanis

CISO at Evolution

CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks

Read More

Eric Hussey

Senior Vice President and Chief Information Security Officer at Finastra

Eric Hussey, Senior Vice President and Chief Information Security Officer at Finastra, discusses his 25+ years in the cybersecurity space

Read More
“We’re really starting to think about ways AI can enable our functions, particularly when it comes to cybersecurity”
Eric Hussey
Senior Vice President and Chief Information Security Officer at Finastra

Christiaan Beek

Senior Director of Threat Analytics at Rapid7

Senior Director of Threat Analytics Christiaan Beek explains how Rapid7 utilise threat intelligence to thwart the attacks of today and tomorrow

Read More

Sean Dyon

Director of Strategic Alliances at HID Global

Enhance enterprise security with passkeys, increasing workforce productivity and fortifying defences with HID

Read More

Graham Thomson

CISO at Irwin Mitchell

Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell

Read More

Janis Lasmanis

CISO at Evolution

CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks

Read More

Top 10

View all

Top 10: Cybersecurity Leaders

These cybersecurity leaders are committed to tackling a continually evolving cyber threat landscape and protecting vital enterprise and customer data

Top 10: Biggest Cyber Threats

As global cyber threats like phishing surge, AI-driven attacks and supply chain vulnerabilities pose new challenges for businesses and governments

Top 10: Cybersecurity Tips

Cyber Security

Top 10 Uses of Blockchain in Cybersecurity

Cyber Security

Cyber Security

View all

Blockchain: What Decentralisation Can Bring to Cybersecurity

While currently underutilised in cybersecurity, the inherent security of blockchain could see it help augment data protection and access management

Blockchain: What Decentralisation Can Bring to Cybersecurity

Palo Alto Networks, Deloitte and The Push to Platformization

Insurers Now Spotlighting Identity and Privilege Compromises

Solarwinds CISO Wants Global Cyber Laws After Winning Case

Huntress: Cyber Insurance, Risks and Pressures in Healthcare

Network Security

View all

Why Work from Home Is Forcing a Rethink on Endpoint Recovery

Although work from home has brought a number of benefits, the number of devices now operating outside of direct company control represents new challenges

Why Work from Home Is Forcing a Rethink on Endpoint Recovery

Infoblox Move to Unify Security amid New Network Complexity

Nokia and NL-ix Deploy Europe’s Largest IXP-Based Anti-DDoS

Palo Alto Networks Buy IBM's QRadar Assets in Win for SIEM

Examining One of the Largest DDoS Attacks of the Year

Videos

View all
Featured

Claroty: protecting society with cyber-physical security

Simon Chassar, Chief Revenue Officer, Claroty, reflects on the last two years, the maturity landscape of those in industrial sectors and Industry 5.0

Cyber Security

Finastra: Secure, Resilient Software for Financial Services

Cyber Security

HID: Powering Trusted Identities

Cyber Security

How Irwin Mitchell Developed a Robust Cybersecurity Strategy

Application Security

View all

Securing Sensitive Business Data with Arctic Wolf & iManage

Security leader Arctic Wolf launches an integration with iManage to secure knowledge workers and protect sensitive data and business-critical applications

QR ‘Quishing’ scams: Do you know the risks?

Could passkeys be the start of a passwordless future?

OT Security

View all

Cloudhouse Head Talks Laws Incoming After Crowdstrike Outage

Cloudhouse Director Jonathan Dedman discusses what legislations tech companies may soon face as a result of the Crowdstrike Outage

Cloudhouse Head Talks Laws Incoming After Crowdstrike Outage

Mastercard Bolsters AI for Banks to Combat Payment Fraud

CrowdStrike Goes to Congress: What Will Come of the Hearing?

Oasis: How Ticket Sellers can Avoid Disappointing Customers

Elastic's Massimo Merlo Talks Securing Academic AI Research

Events

View all

Tech & AI LIVE New York

Connecting Tech & AI Leaders across North America

Register now

Webinar: Are You Ready for AI-Enhanced Cyber Threats?

Join us for a 45-minute discussion on how to transform your SOC to eliminate siloes and gaps that invite threats.

Register now

Tech & AI LIVE: Gen AI

Connecting the world's Tech & AI leaders

Register now

How to Leverage CTEM For Enhanced Cybersecurity

Continuous Vigilance: How to Leverage CTEM For Enhanced Cybersecurity | Thursday, June 27, 2024 · 3:00 p.m. London (GMT +1:00)

Register now

Cloud & Infrastructure

View all

Founder Shield MD on Navigating Multi-Cloud Complexities

Founder Shield Managing Director Jonathan Selby talks strategies to navigating the complexities of multi-cloud set ups

Founder Shield MD on Navigating Multi-Cloud Complexities

Red Hat’s Chris Jenkins on Upping Security with Containers

Aon Points to Area Diversification as Cloud Risk Strategy

Commvault Integrates Industry Giants into Security Solutions

IT Outages and the Risks of a Cloud Oligopoly

Tech & AI

View all

Friend & Foe: AI’s Position in Threat Intelligence

While AI's rapid growth carries cyber vulnerability risks the tech also promises improvements in profiling the very cybersecurity threats it faces

ACDS Taps Thoughtworks for AI-Driven Security Upgrade

Hiddenlayer CSO Tells Why It Made an AI Security Council