Global attack intelligence integrated into local protection

Arbor Networks, Inc. has announced a new reputation-based threat feed as part of its ATLAS® Intelligence Feed (AIF) service. AIF is a research-driven feed of security policies designed to update Arbor’s Pravail products quickly and accurately by identifying threats based on real-world attack activity, reputation and behaviour.

Read More

Insider-Angriffe: Risiko steigt

Vormetric-Umfrage zeigt unzureichende Kontrolle privilegierter Benutzerkonten in deutschen Organisationen. 47 Prozent der befragten Firmen finden, Insider-Angriffe sind noch schwerer erkennbar als in 2012. Die effektivste Methode zur Sicherung der Daten ist die nach wie vor Verschlüsselung

Read More


NSA revelations impact on the Cloud

Report highlights nine major after-shocks compelling organisations to think again about how they use cloud computing.

Read More

Cyber attack ‘Hit List’ expands

Disruptive hacking tactics see financial services industry join government as most at risk for DDoS attacks.

Read More

Integrated retrospective packet forensics

Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic recording from a unified dashboard for performance assurance and detailed incident investigations.

Read More

Campbell Global, a leader in sustainable timberland and natural resource investment management, is...
Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...
Organisations report that 38% of IT security incidents occur as a direct result of their...
Virtustream Viewtrust brings enhanced scalability, performance and serviceability to...
Cyber criminals are systematically testing businesses digital defences in order to steal financial...
Study reveals why companies don’t inform law enforcement about ransomware infections and how...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more