NEWS

Connected devices increase enterprise risk

IoT survey from Palo Alto Networks highlights post-pandemic IoT security issues, as 68% cite increased risks from unsecured IoT devices on business networks due to the shift to remote working.

Read More

NEWS

53% of companies are left exposed to supply chain attacks

Industry demand for URL filtering grew 10 times since last year – slower progress compared to cyberattacks growing in volume and sophistication.

Read More

NEWS

Ransomware's rewards

Research by ThycoticCentrify shows a majority of organizations experienced a ransomware attack, while 93% are allocating special budget to fight growing threats.

Read More

NEWS

Logicalis launches Secure OnMesh

Aligning with one of Gartner’s key trends for 2021 - Cybersecurity Mesh, - “a distributed architectural approach to scalable, flexible and reliable cybersecurity control” - Logicalis is shifting the focus from the traditional, risk focussed approach to security to one that empowers the digital workplace with data-driven managed security services.

Read More

NEWS

Security under scrutiny as hybrid workplace evolves

Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part of their remote access strategy.

Read More

Using standard x86 servers and programmable switches to deploy and manage virtualized networking...
Yet only four out of 10 security leaders in the UK can answer the question, “How secure, or at...
Einfaches Management von mehreren Petabyte Flash Memory Storage auf Violin Memory Speichersystemen...
Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...
Infoblox and its Cyber Intelligence Unit (CIU) have released the latest iteration of the...
The use of IT to improve the delivery of services is the top priority for central government...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more