NEWS

Elastic introduces free and open Limitless XDR

  • Published in

Elastic has launched what it says is the industry’s first free and open Limitless Extended Detection and Response (XDR).

Read More

NEWS

Checkmarx acquires Dustico

  • Published in

Acquisition brings behavioural source code analysis to Checkmarx customers to defend against open source software supply chain attacks.

Read More

NEWS

MVISION Private Access provides ‘Zero Trust’ unified protection

  • Published in

McAfee Enterprise has introduced MVISION Private Access, an integrated approach to enable granular ‘Zero Trust’ access and extend data and threat protection capabilities to private applications hosted across hybrid IT environments.

Read More

NEWS

73% of organisations suffered data breaches caused by phishing

  • Published in

Half of IT leaders say that future remote or hybrid work will make it harder to prevent phishing incidents.

Read More

NEWS

Exabeam launches the XDR Alliance

  • Published in

Founding members unite to help organisations everywhere build state of the art SOCs that defeat adversaries.

Read More

NEWS

Cybercriminals narrow their focus on SMBs

  • Published in

Despite the perception they are too small to target, SMBs are increasingly vulnerable due to supply-chain attacks and greater use of automation by ransomware groups.

Read More

Neustar-sponsored study reveals challenges and benefits of using threat feeds.
DH2i has published the results of its premier Virtual Private Network (VPN) survey of IT...
More proactive use of more sophisticated anti hacking tools against among the latest Cyber...
If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....
Venafi has published survey results highlighting the challenges of improving software supply chain...
NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more