NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

McAfee to acquire Light Point Security

Integrating remote browser isolation capabilities into MVISION UCE enables a complete implementation of SASE Architecture.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Beating BEC

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection.

Read More

NEWS

Global partners receive recognition

FireMon names top performing channel and distributor partners as “Ignite Partner of the Year” award winners.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

Wick Hill named distributor for Avecto.
By Mike Hemes, Regional Director, Western Europe, A10 Networks.
Experienced enterprise and SaaS sales leader to lead the charge with Tufin’s...
DNK, a major insurance company for the shipping industry, has selected Darktrace’s Enterprise...
Sophos has introduced Sophos XDR, said to be the industry’s only extended detection and response...
BeyondTrus has released PowerBroker for Mac to address security and compliance concerns among the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more