FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

F5 offeriert Pay-per-Use-Zahlungsmodell und neue Lösungen für Amazon Web Services

Neue Angebote für AWS von F5: Option für flexible Zahlung nach genutzten Stunden; Orchestrierungs- und Verwaltungslösung; Testverfahren „Test Drive“ für strategische Anwendungstests – Demonstrationen stehen kostenfrei zur Verfügung

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More



HyTrust acquires HighCloud Security

Integrating administrative visibility and control with encryption and key management offers unprecedented security for cloud environments.

Read More

Alert Logic has released its latest cybersecurity analysis, "Critical Watch Report: The State of...
Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly,...
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...
Despite 95 percent of CIOs expecting cyberthreats to increase over the next three years, only 65...
If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....
On average two-in-five computers, related to the technological infrastructure of industrial...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more