Dell extends end-to-end security offerings

  • Published in

Continued innovation and integration around security solutions provide customers with industry-leading, end-to-end security capabilities.

Read More

Telco Systems launches cyber-protection solution

  • Published in

New cyber-security solution also available as a virtualized service.

Read More

Enhanced security and administration for cloud-based deployments

  • Published in

Capabilities provide significant time and cost savings for nShield and payShield customers with multi-data center deployments.

Read More

Senior management have unrealistic expectations about IT downtime

  • Published in

Report identifies gap between IT and senior management expectations.

Read More

British Crime Survey reveals the true scale of fraud and cyber crime

  • Published in

The results for the British Crime Survey for the first time show that fraud and cyber crime are the most prevalent crimes committed against people in England and Wales.

Read More

Research reveals 2016's top IT challenges

  • Published in

Global survey of 2,685 IT pros highlights the biggest challenges IT teams face in the battle over the increasing complexity, security threats and importance of mission critical applications and infrastructure.

Read More

Many of today’s most destructive advanced persistent threats (APTs) were conceived a decade...
Half of first-time security analysts working in Security Operations Centres (SOCs) plan to leave...
Happiest Minds Technologies has launched its Cyber Risk Protection Platform (CRPP), which...
Egress has published the results of its first Insider Data Breach survey, examining the root causes...
More than half of IT security professionals (52 percent) said loss of customer trust and confidence...
Cynet, the world’s first autonomous breach protection platform has appointed Nuvias as its...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more