Logo

State-sponsored cyberattacks: we ain’t seen nothing yet

Survey reveals we’re fighting a losing battle against state-sponsored attacks.

Read More

Options chooses Varonis for data permissions & auditing

  • Published in

Options, global provider of infrastructure as a service (IaaS) products to the financial services sector, has chosen data permission and auditing solutions from Varonis to protect its clients.

Read More

Huawei showcases "Agile Network, Agile World"

During his opening speech Mr. William Xu, CEO of Huawei Enterprise Business Group, shared the company's views and insights on the challenges and trends of building enterprise ICT infrastructures in a fast-changing environment.

Read More

Dell Storage enhances College of North West London technology infrastructure

Replacing EMC legacy infrastructure with Dell Storage has allowed for the undertaking of new IT projects, saving approximately £35,000.

Read More

IBM closes on acquisition of Trusteer

  • Published in

Cybersecurity software lab will focus on mobile and application security.

Read More

McAfee launches Dubai Cyber Defence Centre

  • Published in

New centre will give Middle Eastern and European customers immediate insight into local cyber threats and rapid regional incidence response.

Read More

Includes free assessment & licenses to protect files too sensitive for the cloud.
As evidenced by the onslaught of ransomware attacks and data breaches making the news almost daily...
A recent survey by app security specialist Promon has revealed that mobile users are massively...
WatchGuard report uncovers massive increases in endpoint attacks, rising encrypted malware rates,...
Positive Technologies has released its most recent Cyber Threatscape report, an analysis of Q2 2020...
Expert predicts greater pressure on senior execs to boost cyber resilience.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more