TechData teams with iPass

Tech Data has form a pan-European agreement with iPass Inc. (Nasdaq: IPAS), a leading provider of global mobile connectivity, to distribute its intelligent connection management and Wi-Fi service offerings.

Read More

Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other devices. Exabeam Entity Analytics discovers the normal behaviour of medical, industrial, networking, home and mobile devices, and uses that baseline to alert security teams when unusual events occur.

Read More

NEWS

DigiCert selected to provide Root CA for AeroMACS

DigiCert has been selected to host the Root CA for Aeronautical Mobile Airport Communication System (AeroMACS), the only wireless technology that has been validated by major international regulatory bodies to support the safety and regularity of flight.

Read More


Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More

NEWS

Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More

Microsoft Corp. has announced new cloud services, mobility solutions, APIs, tools and an expanded...
Die zentralisierte F5®Firewall-Management-Lösung schützt 3G- und 4G/LTE-Netzwerke,...
Half of CISOs say their organisation’s desire for growth and rapid digitalisation is detrimental...
Trend Micro intercepted a surge in malware, phishing and credential theft.
Media companies are investing heavily in advanced information and communications technology (ICT)...
Each year organizations increase spending on cyber security protection to keep their businesses,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more