Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

  • Published in

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing on the more security conscious organisations.

Read More

Security best practice guidelines

  • Published in

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the cyber risks confronting government and offers recommendations to mitigate these risks, entitled ‘Operating Securely in the Digital World’. The report provides the outlines of two tools, a suggested Review Process and proposed Development Framework to help boards, senior managers and information teams in organisations that would like to review their information security strategies and...

Read More

Commercial data security getting tougher as cyber attacks get super-smart

  • Published in

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More

HP bringt Next-Generation Firewall

- Neue Firewall von HP TippingPoint inspiziert bis zu zehn Gigabit Daten pro Sekunde - Neue Online-Plattform HP Threat Central sammelt IT-Sicherheitsinformationen durch Crowdsourcing

Read More

F5 Networks erwirbt Versafe und unterstützt so seine Kunden beim Schutz vor Online-Betrug

F5 Networks gab die Übernahme der Versafe Ltd. bekannt. Mit der Übernahme erweitert F5 sein Produktportfolio mit Web-Anti-Fraud-, Anti-Phishing und Anti-Malware-Lösungen. Die Kombination der Web- und Mobile-Lösungen mit den Security Operation Centers (SOC) ergänzt die vorhandenen Sicherheitslösungen von F5 Networks

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

  • Published in

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

Effectiveness comes with complementary investments in human-machine teaming.
As we approach a year of what has now become out-of-office working, cybersecurity continues to be...
29% of companies had no plan in place to cope with a major event like the COVID-19 pandemic.
FireEye has released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs...
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...
MobileIron has published the results of a new consumer sentiment study, which revealed QR codes are...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more