Logo

Data Centre Consolidation - A Cyber Security perspective

  • Published in

By Tony Marques, Encode’s Cyber Security Architect.

Read More

Azlan opens business solutions centre at Heathrow

New facility provides 'unequalled' access to latest technologies for demonstration and training purposes, plus access to Azlan’s pan-European BSC Network

Read More

The pursuit of ‘frictionless authentication’ leaves corporate networks vulnerable to cyber attack

  • Published in

New whitepaper exposes the ‘culture of convenience’ forcing IT departments to overlook essential security measures.

Read More

Cryptzone launches revamped EMEA Channel Partner Program

  • Published in

Cryptzone looks to expand partner channel across Europe as demand for cybersecurity solutions grows.

Read More

Advanced Endpoint Compliance solution for Cloud applications

  • Published in

Cloud access security broker Adallom and OPSWAT, a provider of software-based solutions to secure and manage IT infrastructure, have announced a new jointly-developed advanced endpoint compliance solution for cloud applications.

Read More

Mobility matters

Lack of control of personal data most likely to drive consumers to another brand (54%), followed by if their supplier suffered a data breach (50%), or didn’t provide mobile services (37%).

Read More

Claroty has released research into the state of industrial cybersecurity worldwide, which found...
Finnish card payment system provider gains complete security visibility and combats banking malware.
By Vitali Kremez, Director of Research, Flashpoint.
Agreement provides customers with access to leading ‘Endpoint Protection and Response’...
Venafi has published the results of a study conducted by Dimensional Research. The study...
Fortinet has published the findings of its latest quarterly Global Threat Landscape Report. The...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more