F5 welcomes Mary Gardner as Chief Information Security Officer

Accomplished executive to oversee F5’s security, compliance, and data integrity efforts.

Read More

NEWS

Faster photons could enable total data security

Researchers at the University of Sheffield have solved a key puzzle in quantum physics that could help to make data transfer totally secure.

Read More

Cryptominers and Cloud - the security 'sweetspots'

Check Point’s “Cyber Attack Trends: 2018 Mid-Year Report” reveals 42% of organizations globally hit by cryptomining attacks, while sophisticated Gen V attacks on cloud infrastructures grow.

Read More


One in five businesses don't have precautions in place to protect their digital network

The news is saturated with reports on network hackings and all things GDPR, and it’s more important than ever before that businesses start looking at the methods they’re implementing to store, use and obtain their digital data.  

Read More

Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix.

Read More

$1 million in operational costs saved through fast and reliable connection and data delivery.
New report from the Department for Digital, Culture, Media and Sport (DCMS) reveals the number of...
Gigamon is looking to transform the industry by launching GigaSECURE, the industry’s first...
Infoblox has introduced Infoblox Internal DNS Security, the most comprehensive solution from a...
Global cybersecurity leader Forcepoint has established four market-centric business units....
ObserveIT has published findings from a global survey of 600 IT leaders across various industries,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more