NEWS

Distology to distribute LogRhythm cybersecurity solutions

  • Published in

The exclusive distribution deal expands Distology’s solutions portfolio and enables more VARs to capture new revenue from real-time cybersecurity solutions.

Read More

NEWS

Thycotic and Centrify merge

  • Published in

Combined company to deliver comprehensive cloud privileged access management solutions to meet unique demands of the market, from SMB to global enterprises.

Read More

NEWS

CISOs face constant dilemmas to avoid drowning in their ‘security debt’

  • Published in

Outgunned security executives navigate complex obstacles to keep rising attacks from turning into more breaches.

Read More

NEWS

Enterprises prioritise customer data protection, but continue to leave it exposed

  • Published in

Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations have achieved consistent encryption strategies, and other key trends in encryption and cybersecurity.

Read More

NEWS

Bot traffic climbs to record high

  • Published in

40.8% of internet traffic in 2020 was not human.

Read More

NEWS

Westcon-Comstor to offer intelligence-driven cybersecurity solutions through Anomali

  • Published in

Strategic European distribution agreement will provide customers with world-class cybersecurity protection.

Read More

The market for OpenStack-related products and services will quadruple in size between the end of...
F5 Labs and Webroot release 2018 Phishing and Fraud Report; Fraud incidents between October and...
KPIs out of alignment with business goals?
Smart Cities, Big Data and the changing role of the CIO among key discussion points at Amsterdam...
ConnectWise, the leading provider of intelligent software and expert services for technology...
New SaaS-based security solution powered by Amazon VPC traffic mirroring empowers enterprise SecOps...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more