Firms missing out with do-it-yourself approach to Threat Intelligence

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More


A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

ANSecurity deploys large scale installation of new Check Point SandBlast technology

SandBlast delivers evasion-resistant sandboxing and threat extraction using CPU-level threat detection to uncover threats at the pre-infection level, significantly reducing the risk of expensive breaches.

Read More

Delivering 'complete threat protection'

Bromium has launched vSentry 3.0, which features, among other innovations, behavioural executable analysis to protect corporate networks from file-based and file-less targeted attacks and phishing campaigns.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

Verisign observed that 52 percent of DDoS attacks that were mitigated in Q2 2018 employed multiple...
Innovative service provider deploys network-wide protection against a variety of sophisticated...
New product adds another layer of defence for customers of Delphix Data Platform.
Nuvias Group, the European high value distributor, is further accelerating its growth through a...
Axial Systems is working in partnership with Aqua Security  to provide a market...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more