NEWS

Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More

NEWS

ExtraHop predicts 2017 trends in IT, security, and DevOps

ExtraHop has published its top predictions for enterprise IT in 2017. Based on insight from customers, partners, and industry analysts and insiders, leaders at ExtraHop offer the following forecasts for IT in 2017:

Read More

BT signs up trend micro to strengthen security in the cloud

Customers benefit from new security service integrated into BT’s cloud portfolio.

Read More

Checkmarx appoints Shmuel Arvatz as Chief Financial Officer

Checkmarx has appointed Shmuel Arvatz as the company’s new chief financial officer (CFO).

Read More

NEWS

Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching consequences.

Read More


Trend Micro survey finds 88% of surveyed organizations have accelerated their cloud migration, but...
New research underlines potential value of backdoored machines using SSH machine identities, aided...
Partnership to deliver advanced cyber security and threat prevention solutions to maximize customer...
AlgoBot answers users’ questions and assists with security policy tasks via an intuitive...
Around 60% of BYOD workers do not involve their company IT support in setting up their devices
Retailers are responding to cyber attacks on average twice a week — this is according to the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more