NEWS

State of Utah projected to save millions of dollars

Orchestrated security approach delivers improved asset intelligence through device visibility and real-time reporting for rapid time to value.

Read More

NEWS

IT security professionals suffer from an image problem

New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom mongers’ or a ‘necessary evil’ by employees.

Read More


NEWS

Information Security Forum tackles tomorrow’s security workforce

The Information Security Forum (ISF), the trusted source that senior security professionals and board members turn to for strategic and practical guidance on information security and risk management, has released Building Tomorrow’s Security Workforce.

Read More

NEWS

Average cost of a cyberattack exceeds $1.6 million

A third of business still don’t have an emergency response plan in place, despite 78% of businesses experiencing service degradation or a complete outage in the last year, up 10% on 2018.

Read More

NEWS

Firewall for Japanese 5G deployment

A major Japanese mobile carrier has selected the A10 Thunder® Convergent Firewall (CFW) Gi/SGi firewall solution for its 5G production network, to support the huge network capacity and throughput of 5G and reduce total cost of infrastructure.

Read More

Security operations teams face challenges in understanding how their security tools work leading to...
The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and...
Apptio has released its first IT Economics Report profiling enterprise IT spending...
ExtraHop has announced its top predictions for enterprise IT in 2014. Based on insights gleaned...
Findings from new study of tenured cybersecurity professionals and those seeking their first...
Enables hybrid IT deployment flexibility, scale, resiliency and cost-effective operation.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more