NEWS

Modern attacks leveraging evasive behaviours

VMware has released the VMware Carbon Black “2020 Cybersecurity Outlook” report, which offers a holistic view at how attackers have evolved, what defenders are doing to keep pace and how security and IT teams can work together in 2020 and beyond.

Read More

NEWS

What to make of the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices and AI algorithms.

Read More


NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

Under a new IT services contract with Lockheed Martin, the Highways Agency is set to improve the...
By Darren Gross, EMEA Regional Director, Centrify.
New Montreal office fully operational in less than 12 months supported by IT infrastructure from...
Check Point’s “Cyber Attack Trends: 2018 Mid-Year Report” reveals 42% of organizations...
Bitdefender has launched Bitdefender GravityZone Security for Storage to protect enterprises...
Red Hat has announced the general availability of Red Hat Enterprise Linux OpenStack Platform 4.0....
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more