Organisations spend half a million pounds, annually, dealing with false positive alerts

A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence. The report found that teams spend, on average, 272 hours each week responding to ‘false positive’ cyber alerts – due to erroneous or inaccurate malware alerts. This equates to an average cost of £515,964 annually, for each organisation, in lost time.

Read More

Check Point teams with VMware

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention for all data centre traffic.

Read More


Fortinet closes acquisition of Meru Networks

Fortinet has closed the acquisition of Meru Networks. With the close of this acquisition, Fortinet expands on its secure wireless vision and enterprise growth focus, broadens the company’s solutions portfolio, and expands its opportunity to uniquely address the $5B global enterprise Wi-Fi market with integrated and intelligent secure wireless solutions.

Read More


How to be a security policy management saint, not a sinner

The path to policy righteousness demands the right processes, visibility and automation – but the rewards are improved security and better business agility. By Nimmy Reichenberg, VP marketing & strategy for AlgoSec.

Read More

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...
Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...
Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal...
Corero Network Security has entered into an agreement under the Strategic Alliance Program with...
Lancope, Inc., a leader in network visibility and security intelligence, has announced the results...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more