VIDEO

Apple devices in the security spotlight - Addigy interview

Addigy’s Founder and CEO, Jason Dettbarn, explains how Apple devices are attracting increasing levels of security attacks, and what measures the company takes to counter these threats, as well as outlining how Addigy can help its customers to be confident and secure when using its Apple-based solutions.

Read More


BLOG

Why AI is now table-stakes in cybersecurity

By Dr. Sven Krasser, Senior Vice President and Chief Scientist, CrowdStrike.

Read More



BLOG

Securing a path to the cloud for your business

By Stuart Green, Cloud Security Architect at Check Point Software Technologies.

Read More

Almost half (45 percent) of UK organisations have been compromised by phishing attacks in the last two years, while 54 percent said they had identified instances of employees replying to unsolicited emails or clicking on links contained within them, according to research conducted for Sophos, a leader in network and endpoint security.
Without regulation, the IoT security threat will continue to grow in 2019.
New research underlines potential value of backdoored machines using SSH machine identities, aided by close collaboration between cybercrime and APT groups.
The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.
Survey reveals that half of MSPs now manage their customers’ compliance obligations.
Check Point CloudGuard now offers the broadest workload security in the market, which automatically protects applications, functions, and containers from development through runtime, across any cloud via a single interface.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more