Logo
NEWS

Mobile devices pose major security risk

  • Published in

Ovum report identifies mobile as an open door for cybercriminals to attack business systems.

Read More

Cyber security? There’s more at risk than you might think

  • Published in

Think of cyber attacks and the chances are computer hacking will be the first, and possibly only, example which springs to mind.

Read More

Is your reputation secure?

  • Published in

Loss of reputation and customer confidence is enterprises’ biggest fear related to data security – indicates new report.

Read More

BringinghHigh availability security to mobile business networks

  • Published in

Setting the gold standard for business continuity through innovative dynamic licence pooling to deliver secure access for all data types across any device.

Read More

NEWS

Organisations remain unprepared to respond to cyberattacks

  • Published in

Two-year study shows decline in Cyber Resilience in 2016.

Read More

CyberArk adds credential theft blocking

  • Published in

CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting credential theft at the endpoint. CyberArk Viewfinity, with enhanced threat protection features, is now available as CyberArk Endpoint Privilege Manager.

Read More

These predictions for 2015 are from Stuart Evans, Chief Technology Officer, at Invu.
Outsourcery plc is working with Dell to design and deploy the compute, storage and networking...
Security and privacy concerns plague 77% of IT leadership when building and implementing mobility...
Due to the current pandemic, and the ensuing remote work, many organisations have now had to change...
Sudden changes in priorities, poor network visibility and lack of time cited as key issues for...
Use of IoT devices is proliferating in every industry, and with this growth comes risk – reports...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more