CyberArk announces changes to board of directors

  • Published in

Udi Mokady elected chairman; Gadi Tirosh named lead independent director.

Read More

Wick Hill and Zycko become part of Nuvias Group

  • Published in

Wick Hill and Zycko will now be known as ‘Wick Hill, a Nuvias group company’ and ‘Zycko, a Nuvias group company.’

Read More

Almost one-third of cyber security professionals admit to cheating on audits

  • Published in

Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.

Read More

Gartner identifies security top ten

  • Published in

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More

Survey focuses on cyber weapons

  • Published in

LightCyber has published the results of its Cyber Weapons Report 2016, a first-of-its-kind industry study which uncovers the top tools attackers use once they penetrate a network and work towards successfully conducting a data breach or other malicious goals.

Read More

NEWS

Cyber threats impact on data losses

  • Published in

Incidents of traditional data loss and disruption are down since 2014, but new challenges mean 13% more businesses experienced loss overall.

Read More

New Pulse Policy Secure delivers continuous compliance with enhanced endpoint and IoT visibility,...
KPMG LLP and ServiceNow have announced the results of a joint survey, shedding light on how IT...
Redesigned portal delivers an enhanced Content Hub, marketing automation tools, and easier...
Thycotic has expanded its PAM-as-a-service solution to address the velocity and scale requirements...
Tenable levels-up its global technology integrations program with launch partners Amazon Web...
Partnership extends the Zscaler platform by integrating threat intelligence while augmenting...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more