NEWS

Endpoint security issues

  • Published in

Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report that analyses the ongoing security risk of popular websites and software.

Read More

NEWS

Compromised credentials a top concern

  • Published in

Length of investigations, limited resources, and lack of context put security professionals at a disadvantage when responding to security incidents.

Read More

BLOG

Top information security threats for 2016

  • Published in

As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face in the next 12 months.  While some of these trends started in 2015 and are expected to continue, others will bring new challenges for security professionals.

Read More

More endpoints mean more security

  • Published in

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than 1,100 global ITSPs.

Read More

NEWS

Enhanced visibility and security for Sportingbet

  • Published in

Leading sports betting brand turns to wire data analytics to improve network and application performance; leverages proactive alerting to spot security threats.

Read More

Even as travel restrictions slowly ease around the world, our work environment doesn’t look like...
Against a rising trend of cyber criminals targeting the retail sector, children’s...
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in...
Nearly three out of four Brits are more alarmed than ever about their privacy, but many are willing...
LogRhythm’s EMEA footprint expands as CloudAI becomes available to more customers and regions.
A10 Networks is offering a leap forward for service providers with DDoS protection at the scale...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more