Logo

CyberArk announces changes to board of directors

  • Published in

Udi Mokady elected chairman; Gadi Tirosh named lead independent director.

Read More

Wick Hill and Zycko become part of Nuvias Group

  • Published in

Wick Hill and Zycko will now be known as ‘Wick Hill, a Nuvias group company’ and ‘Zycko, a Nuvias group company.’

Read More

Almost one-third of cyber security professionals admit to cheating on audits

  • Published in

Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.

Read More

Gartner identifies security top ten

  • Published in

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More

Survey focuses on cyber weapons

  • Published in

LightCyber has published the results of its Cyber Weapons Report 2016, a first-of-its-kind industry study which uncovers the top tools attackers use once they penetrate a network and work towards successfully conducting a data breach or other malicious goals.

Read More

NEWS

Cyber threats impact on data losses

  • Published in

Incidents of traditional data loss and disruption are down since 2014, but new challenges mean 13% more businesses experienced loss overall.

Read More

New threat defense platform provides centralized risk visibility and prioritizes alerts for faster...
New Israeli location to employ more than 100 new employees focused on stopping cyberthreats and...
The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security,...
Bromium and NTT Com Security have formed a strategic global partnership to deliver Bromium’s...
Arqit Quantum Inc. and Juniper Networks have signed a ‘Technology Alliance Partner Connect’...
Varonis Systems, Inc. has helped Ipswich Hospital allow both internal and external access to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more