BLOG

Data-driven DDoS defence decision making

  • Published in

By Mike Hemes, Regional Director of A10 Networks.

Read More

NEWS

Coop employs Vectra Cognito to protect its retail operations from cyberattacks

  • Published in

Leading Swiss retail group uses Cognito artificial intelligence platform to reduce cyber risk.

Read More

Security compliance 'time bomb'

  • Published in

Line-of-business (LoB) leaders and IT are anxious about IoT/OT security due to concern about negative outcomes of a security breach.

Read More

BLOG

Cyber Security Lessons from Nursery

  • Published in

By Alastair Hartrup, CEO, Network Critical.

Read More

Seven trends driving enterprise IT transformation in 2018

  • Published in

It’s all about transformation in 2018, as global brands and government agencies look to use technology to better serve their customers, and differentiate themselves from the competition.

Read More

Validating end-to-end network security access for Cloud environments

  • Published in

Ixia has launched BreakingPoint Cloud, a SaaS solution that safely models data breaches and threat vectors to deliver quantifiable evidence and insights into the effectiveness of organizations’ cloud-based data and application security, whether private, public or hybrid.

Read More

New figures from F5 Labs report 64% rise in attacks and greater tactical diversity from...
Westcon and Sumo Logic have have signed an EMEA distribution agreement. Sumo Logic is the market...
Sixty-three per cent of C-suite more concerned about paying for the costs of a cybersecurity...
SolarWinds has expanded its security portfolio with SolarWinds® Endpoint Detection and Response...
According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam...
Nearly half of UK company data remains unclassified, despite a rise in security breaches and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more