Logo

The pressure is on to innovate

New study scorecards IT performance against business and customer-value building metrics; highlights benefits of embracing game-changing technologies

Read More

Security: A hot topic among top management  

  • Published in

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

Security orchestration

  • Published in

Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across heterogeneous networks.

Read More

CREST signs new partnership with Offensive Security to improve the standards of information security

  • Published in

Leading UK and US penetration testing certification bodies join forces in global drive to professionalise cyber security sector.

Read More

CA Technologies to acquire Xceedium

  • Published in

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the quarter.

Read More

Top five ways to increase business IT security

  • Published in

By Roger Keenan, managing director of London data centre, City Lifeline.

Read More

68% of IT organisations have no to modest confidence to manage digital threats, despite a...
Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part...
MWR InfoSecurity launches Countercept service – to catch a thief it has to think like one.
Four in five (82%) businesses remain concerned about the security risks of employees working...
Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of...
BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more