Logo

Bromium introduces Protected App

  • Published in

Bromium’s Protected App builds a wall around critical applications on the endpoint and secures access to and from the host, even if the host is compromised.

Read More

Mimecast acquires Solebit

  • Published in

Mimecast has acquired security software developer Solebit for approximately $88M net of cash acquired.

Read More

Synopsys 'redefines' interactive application security testing

  • Published in

Continuously detects and verifies web app vulnerabilities at the speed of DevOps, identifies and tracks sensitive data for compliance.

Read More

Cofense SOARs above existing security orchestration and automation offerings

  • Published in

Global human-phishing defense leader introduces new phishing SOAR platform to quickly stop phishing attacks in progress more efficiently .

Read More

It’s time to get #BreachReady this summer!

  • Published in

The heat is increasing in the cyber world and IT Governance is calling on organisations to top up their SPF (security protection factor) and get themselves #BreachReady this summer.

Read More

A third of businesses admit to security breach in past few years

  • Published in

Survey reveals only 11% of businesses were adhering to GDPR regulation in April 2018.

Read More

Setting the gold standard for business continuity through innovative dynamic licence pooling to...
FireEye, Inc. has announced the release of a report titled, “World War C: Understanding...
Juniper Networks and Amdocs will showcase an automated virtualized customer premises equipment...
Survey reveals that hacking landscape will get much worse and IT security professionals cannot even...
Latest version enables security teams to make faster and more informed decisions by providing a...
Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more