NEWS

Report examines cyber criminal tactics

  • Published in

New report looks at why these low-volume attacks are so costly, and how to protect your business from these targeted threats.

Read More

NEWS

IT ops and security staff leave businesses at risk

  • Published in

Two thirds (67%) of businesses say that driving collaboration between security and IT ops teams is a major challenge.

Read More

NEWS

New Greenbone research reveals that 1.19 billion confidential medical images are now freely available on the internet

  • Published in

Upated report on unsecured PACS servers shows problem has escalated in the last 60 days.

Read More

NEWS

Research into simulated phishing

  • Published in

CybSafe invites cyber security professionals to contribute to new academic research into the impact of simulated phishing.

Read More

NEWS

NTT reveals cybersecurity trends that will shape business technology in 2020

  • Published in

Security Orchestration, Automation and Response (SOAR) will rocket to address cyber attacks happening at machine speed.

Read More

NEWS

Mind the cybersecurity skills gap

  • Published in

2019 Cybersecurity Workforce Study also examines motivations and career paths of cybersecurity professionals and shares recruitment strategies for organizations to use.

Read More

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...
Check Point adds new capabilities to SandBlast Mobile Solution in response to increased mobile...
Defence plans should be made around an asset based approach.
Awake Security, the network detection and response (NDR) security division of Arista Networks, has...
Industry survey examines trends in Cloud, co-location, and provisioning of storage & server...
Insight research highlights growing importance of IT in the workplace with 8 in 10 business...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more