AlgoSec partners with Qualys

  • Published in

New integration delivers application-centric vulnerability management, aggregating and scoring vulnerabilities based on risk, and continuous monitoring for changes in data centre environments.

Read More

New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

  • Published in

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More

Lancope introduces StealthWatch Labs security updates

  • Published in

Security updates from Lancope’s research team help customers combat today’s ever-evolving threat landscape.

Read More

Bit9 and Carbon Black merge

  • Published in

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.

Read More

If you want my data, reward me

  • Published in

At the moment we provide our personal details free to data-gathering giants like Facebook and Google, but that won’t always be the case, write Daniel de Bruin and Brad Thiele.

Read More

Intermedia adds McAfee Email Defense

  • Published in

Intermedia has chosen McAfee to protect its customers and partners from email-based security threats and business continuity risks.

Read More

Tanium survey of IT decision makers finds that enterprises are observing uptick in risky behaviours...
Report identifies gap between IT and senior management expectations.
83% of respondents believe their organization is at risk, while 64% anticipate the problem...
According to the new report by Allied Market Research, titled "Global Cloud Services Market...
A report about wasteful spending.
Palo Alto Networks has introduced Enterprise Data Loss Prevention (DLP)—a cloud-delivered service...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more