NEWS

Distology to distribute LogRhythm cybersecurity solutions

  • Published in

The exclusive distribution deal expands Distology’s solutions portfolio and enables more VARs to capture new revenue from real-time cybersecurity solutions.

Read More

NEWS

Thycotic and Centrify merge

  • Published in

Combined company to deliver comprehensive cloud privileged access management solutions to meet unique demands of the market, from SMB to global enterprises.

Read More

NEWS

CISOs face constant dilemmas to avoid drowning in their ‘security debt’

  • Published in

Outgunned security executives navigate complex obstacles to keep rising attacks from turning into more breaches.

Read More

NEWS

Enterprises prioritise customer data protection, but continue to leave it exposed

  • Published in

Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations have achieved consistent encryption strategies, and other key trends in encryption and cybersecurity.

Read More

NEWS

Bot traffic climbs to record high

  • Published in

40.8% of internet traffic in 2020 was not human.

Read More

NEWS

Westcon-Comstor to offer intelligence-driven cybersecurity solutions through Anomali

  • Published in

Strategic European distribution agreement will provide customers with world-class cybersecurity protection.

Read More

New SOTI report finds almost half (48%) of consumers have abandoned an online purchase because they...
Cyber Essentials eases path to cyber insurance for UK’s SMEs.
At the moment we provide our personal details free to data-gathering giants like Facebook and...
Barncat Threat Intelligence Database provides access to 100,000+ intelligence records of remote...
Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...
Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more