Logo

Panaseer receives funding panacea

  • Published in

Fast-growing cyber security software firm attracts new clients in UK and US.

Read More

Check Point secures Wolverhampton College network

  • Published in

Check Point solution gives college greater control and visibility over network and simplifies security management.

Read More

Cyber attacks becoming automated and 'industrialised'

  • Published in

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More

Exposing haphazard privileged account management practices

  • Published in

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More

A10 Networks expands portfolio of security solutions

  • Published in

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Research examines real-world networks’ exposure to credential theft attacks

  • Published in

Research provides insights into cyber attacks that abuse hijacked privileged credentials to compromise enterprise security.

Read More

Rubrik has announced major data security features that enable organisations around the world to...
74 per cent of IT decision-makers believe perimeter security is effective at keeping out security...
The proliferation of different devices, networks, platforms and applications to support the...
Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...
Blue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...
Nearly seven in ten large companies identified a breach or attack.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more