Logo
NEWS

Report examines cyber criminal tactics

  • Published in

New report looks at why these low-volume attacks are so costly, and how to protect your business from these targeted threats.

Read More

NEWS

IT ops and security staff leave businesses at risk

  • Published in

Two thirds (67%) of businesses say that driving collaboration between security and IT ops teams is a major challenge.

Read More

NEWS

New Greenbone research reveals that 1.19 billion confidential medical images are now freely available on the internet

  • Published in

Upated report on unsecured PACS servers shows problem has escalated in the last 60 days.

Read More

NEWS

Research into simulated phishing

  • Published in

CybSafe invites cyber security professionals to contribute to new academic research into the impact of simulated phishing.

Read More

NEWS

NTT reveals cybersecurity trends that will shape business technology in 2020

  • Published in

Security Orchestration, Automation and Response (SOAR) will rocket to address cyber attacks happening at machine speed.

Read More

NEWS

Mind the cybersecurity skills gap

  • Published in

2019 Cybersecurity Workforce Study also examines motivations and career paths of cybersecurity professionals and shares recruitment strategies for organizations to use.

Read More

For anyone trying to understand how the data centre and its contents (facilities and IT) needs to...
Proofpoint has published its annual Human Factor report findings, which detail that...
The Telco Security Alliance has announced new collaborative efforts designed to further enhance the...
Harmony - said to be the industry’s first unified solution for remote work, providing...
Millions of connected devices used in smart cities, industrial IoT and smart homes could be...
SEPPmail baut neue Techniker- und Beratergemeinschaft für Partner in Deutschland und...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more