Intel Blockchain technology offered as a Service in Oracle Cloud

At Oracle OpenWorld, Intel announced that its processor technology is being utilized by Oracle to deliver a cloud-based blockchain service to its enterprise customers.

Read More

DDoS threats analysed in global threat report

Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of more than 15,000 network and application layer DDoS attacks mitigated by Imperva Incapsula’s services during Q2 2017. Information about DDoS bot capabilities and assumed identities comes from a random sample of 39.1 billion DDoS bot requests collected from such assaults over the same period.

Read More


Most companies are unprepared for DNS attacks

Infoblox has released results of a global survey finding that DNS security is often overlooked when it comes to cybersecurity strategy, with most companies inadequately prepared to defend against DNS attacks.

Read More

New Atos paper outlines major advances in cyber security

Atos, a global leader in digital transformation, believes waiting for digital threats to materialise will soon be consigned to history as we enter a new age of predictive cyber security capability able to ward off cyber threats even before they occur.

Read More


Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...
Map highlights all attacks detected by Check Point gateways globally, showing the country of...
NTT Com Security has been named as both UK Partner of the Year and EMEA Reseller of the Year by...
ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...
Polycom research reveals that IT leaders need to establish themselves in the boardrooms to respond...
Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more