NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

McAfee to acquire Light Point Security

Integrating remote browser isolation capabilities into MVISION UCE enables a complete implementation of SASE Architecture.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Beating BEC

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection.

Read More

NEWS

Global partners receive recognition

FireMon names top performing channel and distributor partners as “Ignite Partner of the Year” award winners.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

Research finds implementing RMM solution saves IT professionals ~$50,000 per year.
LANDESK has announced the release of new features and upgrades to its Enterprise Mobility...
Encryption with public cloud services experienced double digit growth.
Gigamon has introduced new integrations with both Splunk and Phantom aimed at accelerating...
Following its separation from Hewlett-Packard Company, Hewlett Packard Enterprise debuts as...
Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more