Logo

EfficientIP launches high performance SOLIDserver DNS Blast

  • Published in

First solution to support up to 17 million queries per second - 60 times more than current solutions.

Read More

Cyber attacks reliant on privileged credential exploitation

  • Published in

CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials form the basis of each attack.

Read More

Zero Trust Environment Infrastructures and the role of the CIO

  • Published in

By Dr. Wieland Alge, Vice President and General Manager EMEA Barracuda Networks.

Read More

Dell offers top five best practices for overcoming BYOD and mobile security challenges

  • Published in

Tips for finding the right balance between data security and workforce productivity.

Read More

Policy optimiser closes costly ‘access gap’

  • Published in

FireMon has announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.

Read More

Major reorganisation at Wick Hill

  • Published in

New Training Centre and new Professional Services Manager role at Wick Hill, as the VAD provides the framework for more growth.

Read More

Subscription-based managed service provides around-the-clock access to security experts, endpoint...
Organisations perceive threat level to be ‘very significant,’ with a third planning greater...
Rubrik has appointed Rinki Sethi as Chief Information Security Officer. Sethi will be responsible...
NTT Security, the specialised security company of NTT Group, has announced changes to its ...
By Roger Keenan, managing director of London data centre, City Lifeline.
Acronis® has announced a promotion for Acronis mobilEcho with MobileIron AppConnect to help...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more