NEWS

Dispersed data is 'beyond control'

  • Published in

Thousands of data loss incidents occur every month in the cloud, leaving most at risk of sensitive data loss or regulatory non-compliance.

Read More

BLOG

Introducing security to the DevOps cycle

  • Published in

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More

NEWS

Secure Channels chooses Thales

  • Published in

Thales’ encryption key management will provide data security innovator Secure Channels with secure quantum-resilient cybersecurity technology.

Read More

NEWS

Westcon to distribute Netskope Platform

  • Published in

Westcon, the global technology distributor, has signed a distribution agreement with the Magic Quadrant leader in cloud security, Netskope. The agreement will see Westcon distribute Netskope’s extensible, cloud-native platform across the Benelux, DACH and Nordic regions.

Read More

NEWS

NETSCOUT introduces Arbor Sightline with Sentinel

  • Published in

Layer 7 visibility, inter-provider signalling and orchestrated mitigation support greater DDoS visibility and Smart Protection at the network’s edge.

Read More

NEWS

Training and reporting key to combat phishing attacks

  • Published in

New study finds that nearly 90% of organisations faced business email compromise (BEC) and spear phishing attacks in 2019.

Read More

Sepio Systems, a leader in the Rogue Device Mitigation (RDM) market, introduces the next generation...
Training remains a critical form of defence against cyber-attacks.
Cognito platform from Vectra closes the security gap with real-time, AI-powered cyberattack...
A new remote workforce study from CyberArk has found that the majority of UK employees feel more...
Using Clavister’s security gateway SHL will be able to offer hockey fans services including...
Kaspersky and Alias Robotics have partnered to boost cyber-protection for robots that are used in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more