Logo

AlienVault  launches Beta version of Open Threat Exchange 2.0

  • Published in

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily.

Read More

Monitoring overall network health

  • Published in

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship product to help customers align security policies with business objectives.

Read More

FireMon acquires mmediate Insight to expand security solutions portfolio

  • Published in

Acquisition delivers first-ever combination of proactive network security intelligence and real-time security event analysis.

Read More

Clavister secures deal with world’s largest bulb mediator

  • Published in

Clavister has given details of a deployment with CNB (Coöperatieve Nederlandse Bloembollencentrale), the world’s largest authority in plant bulbs.

Read More

Data security - top tips for senior managers

  • Published in

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved in data security and offers his top tips.

Read More

NHS Dumfries and Galloway adopts a proactive approach to safeguarding patient data

  • Published in

Guarding against security threats with a state-of-the-art vulnerability management solution.

Read More

Two-year study shows decline in Cyber Resilience in 2016.
Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...
By Wieland Alge, VP and GM, EMEA at Barracuda Networks.
Global cybersecurity leader Forcepoint has established four market-centric business units....
In the run-up to GDPR, new research from the DMA and Acxiom shows that people are increasing...
Outpost24 has acquired Blueliv, a leading cyber threat intelligence company in Barcelona, Spain....
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more