NEWS

Malware attacks on the rise again

  • Published in

Research for October 2016 reveals both the number of malware variants and recognized attacks increased by 5% during the month.

Read More

LogRhythm 7.2 boosts effectiveness and efficiency of enterprise SOCs

  • Published in

More powerful machine analytics, embedded security automation and orchestration, and enhanced performance at scale extend differentiation for company’s threat lifecycle management solution.

Read More

35 percent of websites are putting users at risk

  • Published in

With January deadline for SHA-2 migration just 45 days away, many websites could face major disruptions in the New Year.

Read More

BringinghHigh availability security to mobile business networks

  • Published in

Setting the gold standard for business continuity through innovative dynamic licence pooling to deliver secure access for all data types across any device.

Read More

NEWS

Organisations remain unprepared to respond to cyberattacks

  • Published in

Two-year study shows decline in Cyber Resilience in 2016.

Read More

CyberArk adds credential theft blocking

  • Published in

CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting credential theft at the endpoint. CyberArk Viewfinity, with enhanced threat protection features, is now available as CyberArk Endpoint Privilege Manager.

Read More

Symantec expects to receive approximately $6.3 billion in net cash proceeds.
 NCC Group, global cyber security and risk mitigation expert, is offering unique threat...
Knowledge-based identification may be the preferred way to authenticate online, but for how...
The proposed acquisition will extend Palo Alto Networks leadership in cloud security.
Organisations apply stronger PKI security controls due to their increasingly critical role today.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more