Logo

50% surge in encrypted traffic

  • Published in

Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.

Read More

Gemalto releases findings of 2015 Breach Level Index

  • Published in

Theft of identities and personal information retains top spot, accounting for 53% of data breaches; healthcare and government overtake retail as most-targeted sectors.

Read More

17 per cent of IT managers admit to hacking

  • Published in

Absolute® Software has published the results of a research report the company conducted among IT managers and decision makers in the United Kingdom. The report provides insight into the attitudes, behaviour, and confidence levels of IT departments when it comes to the security of their organisations.

Read More

Tripwire debuts Online Security Application Exchange Platform

  • Published in

Tripwire App Exchange accelerates, integrates and automates security, compliance and IT operations.

Read More

Nexsan adds Web browser access

  • Published in

Nexsan says that its family of Transporter private cloud file sync and share appliances, now offers secure data access via industry standard Web browsers.

Read More

NEWS

Borica-Bankservice selects Vormetric

  • Published in

Vormetric has published details of a new deployment of data encryption solutions for Borcia-Bankservice in Bulgaria.

Read More

Enterprises embracing hybrid cloud, but need better visibility and security management processes to...
BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...
Corero Network Security has entered into an agreement under the Strategic Alliance Program with...
Virtual learning platform provides easily accessible cyber war scenarios that...
Survey of more than 600 IT professionals highlights dangers of public cloud services such as...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more