CertCentral Enterprise adds notable enterprise controls and anchors the DigiCert flagship TLS platform.
Read MoreEfficient and highly available appliance is a ready-to-use cyber protection solution that integrates proven, tested hardware and software in one unit that’s easy to install and operate.
Read MoreApplication innovation is at the heart of the digital economy. A new era of apps is redefining what data centers are and need to be capable of supporting. Because today, the data center is no longer a fixed place. It exists wherever data is created, processed and used. That is why Cisco is announcing a new architecture that extends the data center to everywhere that data lives and everywhere applications are deployed.
Read MoreDatto has announced the global availability of Datto RMM 6.5, which helps MSPs provide reliable security services through improved remote endpoint software patch management. With endpoint attacks up 20% YoY costing businesses millions, according to the Ponemon Institute, proper endpoint patching is the first line of defense for businesses worldwide. Datto RMM 6.5 will help MSPs better address the security needs of their customers’ IT environments.
Read MoreIn November 2018, Kaspersky Lab started to process malicious and suspicious files shared by users of Kaspersky Lab products in Europe in Zurich, Switzerland. The data, which users have actively chosen to share with Kaspersky Lab, includes suspicious or previously unknown malicious files and corresponding meta-data that the company’s products send to Kaspersky Security Network (KSN) for automated malware analysis.
Read MoreThe threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business...
Read More