Panaseer receives funding panacea

  • Published in

Fast-growing cyber security software firm attracts new clients in UK and US.

Read More

Check Point secures Wolverhampton College network

  • Published in

Check Point solution gives college greater control and visibility over network and simplifies security management.

Read More

Cyber attacks becoming automated and 'industrialised'

  • Published in

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More

Exposing haphazard privileged account management practices

  • Published in

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More

A10 Networks expands portfolio of security solutions

  • Published in

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Research examines real-world networks’ exposure to credential theft attacks

  • Published in

Research provides insights into cyber attacks that abuse hijacked privileged credentials to compromise enterprise security.

Read More

One in four European companies would be significantly exposed in the event of a cyber-attack,...
New report from Skyhigh Networks analyses data from more than a million users to uncover usage and...
Accelerator graduate develops innovative security analysis technology.
Mobile app-based deployment option offers increased speed for authentication.
Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.
Eighty-eight percent of state and local government IT professionals are concerned about cyber...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more