Chester Zoo protects critical IT infrastructure

Intrusion detection and prevention, and application control, add new level of security and reporting at zoo.

Read More

Priveleged security at Volkswagen

Volkswagen Commercial Vehicles, part of the Volkswagen AG group, has implemented CyberArk’s Privileged Account Security solution to optimise its password management. As part of a security infrastructure project, Volkswagen Commercial Vehicles in Hanover, Germany, has introduced CyberArk’s Privileged Identity & Privileged Session Management suites to manage non-personalised privileged user accounts automatically, ensure compliance with uniform password policies, and maintain a...

Read More

Don’t ignore cyber threats

According to new research conducted by the Department for Business, Innovation & Skills (BIS) with MI5 and GCHQ – only 14 per cent of directors responsible for audit at the FTSE 350 firms regularly consider cyber threats, with a significant number receiving no intelligence at all about cyber criminals.

Read More


The last rites of traditional IT security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.

Read More


Firm’s sixth annual report shares insights and statistics from more than 950 incidents managed in...
Leading developer of next-generation cybersecurity software now provides enhanced security...
Almost 1/5 have suffered at least one data breach in the last two years .
Wick Hill and Zycko will now be known as ‘Wick Hill, a Nuvias group company’ and ‘Zycko, a...
Research reveals that 80 percent of comment spam traffic is generated by 28 percent of attackers.
Industry leaders join BeyondTrust to push the boundaries of the industry while accelerating...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more