Logo

Bromium introduces Protected App

  • Published in

Bromium’s Protected App builds a wall around critical applications on the endpoint and secures access to and from the host, even if the host is compromised.

Read More

Mimecast acquires Solebit

  • Published in

Mimecast has acquired security software developer Solebit for approximately $88M net of cash acquired.

Read More

Synopsys 'redefines' interactive application security testing

  • Published in

Continuously detects and verifies web app vulnerabilities at the speed of DevOps, identifies and tracks sensitive data for compliance.

Read More

Cofense SOARs above existing security orchestration and automation offerings

  • Published in

Global human-phishing defense leader introduces new phishing SOAR platform to quickly stop phishing attacks in progress more efficiently .

Read More

It’s time to get #BreachReady this summer!

  • Published in

The heat is increasing in the cyber world and IT Governance is calling on organisations to top up their SPF (security protection factor) and get themselves #BreachReady this summer.

Read More

A third of businesses admit to security breach in past few years

  • Published in

Survey reveals only 11% of businesses were adhering to GDPR regulation in April 2018.

Read More

Research by ThycoticCentrify shows a majority of organizations experienced a ransomware attack,...
But a third of workers do not use passwords on mobile devices used for work.
Innovative bring your own key (BYOK) capability allows businesses to retain control of critical...
Sophos has published findings from its survey report, “The State of Ransomware in Financial...
GTT Communications has launched its Distributed Denial of Service (DDoS) Mitigation service, a ...
As its report finds hackers seek to exploit remote working vulnerabilities and pandemic panic, NTT...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more