NEWS

Unprotected machine identities cost billions

Venafi sponsored report by AIR Worldwide reveals large companies will see the highest proportion of losses.

Read More

NEWS

Managing security data headaches

Sumo Logic’s Cloud SIEM Enterprise offering includes a rich set of capabilities to ease the burden on security operations center (SOC) personnel.

Read More

NEWS

Cyberattack fears are delaying business innovation

Research by HackerOne reveals how cyber fears are holding back IT projects, despite businesses feeling the pressure to innovate.

Read More

NEWS

ThreatConnect introduces Workflow

Latest version enables security teams to make faster and more informed decisions by providing a single Platform for threat intelligence analysis, incident response plans, and security processes.

Read More

NEWS

Exabeam unveils Cybersecurity Scholarship Program

Three awards designed to recognise and cultivate the next generation of cybersecurity professionals.

Read More

NEWS

Uncovered - the countries most at risk from cybercrime

The severity of cyber-breaches has become more and more intense in recent years. As a result, security experts at Specops Software sought to find out which (Western) European countries are the most cyber-insecure for citizens.

Read More

With data breaches and security vulnerabilities increasing year after year.  Matt...
Barracuda has introduced the new Barracuda Vulnerability Manager, a cloud-based service to help...
A10 Networks has introduced the A10 Ingress Controller for Kubernetes, and its integration with...
Kaseya’s seventh benchmark survey finds cybersecurity and data protection continue to present the...
Thales says that enterprises may now test-drive its Vormetric Transparent Encryption solution...
Trend Micro survey finds 88% of surveyed organizations have accelerated their cloud migration, but...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more