Logo

Intelligent IT solutions for the Internet of Things

By Patrick Steiner, Lead Architect at Red Hat.

Read More

How data centre security can uphold online democracy

  • Published in

By Paul Dignan, Field Systems Engineer, F5 Networks

Read More

Organisations in EMEA take proactive security stance

  • Published in

Service providers and product vendors are collaborating to bring compelling solutions to these markets, says Frost & Sullivan.

Read More

Protecting data in the Cloud

  • Published in

Vormetric has released Vormetric for SaaS Providers. Security and compliance concerns have always hindered broad adoption of SaaS solutions by enterprise customers. Vormetric for SaaS Providers includes critical security controls that enable SaaS providers to address the most important of these concerns, and make broad enterprise adoption a reality. The solution includes field, file and folder encryption and associated data security controls that can be used to transparently shield enterprise...

Read More

Antivirus and firewalls are no longer enough

  • Published in

Wick Hill named distributor for Avecto.

Read More

Terbium Labs leverages MapR

  • Published in

More than 350 billion data fingerprints are used to automatically detect breaches in minutes.

Read More

Keanini brings nearly 25 years of network and security experience with companies including Cisco...
Rapid7 has announced enhancements to its critical security controls monitoring platform, Rapid7...
Bitglass has released its sixth annual Healthcare Breach Report. Each year, Bitglass analyses data...
• ‘We Connect.’ Journey of Innovation – Offers free live sessions on the latest trends in...
Global contemporary fashion brand majors on security as part of wider digital transformation...
Survey reveals only 11% of businesses were adhering to GDPR regulation in April 2018.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more