NEWS

Organisations slow to change after cyber attacks

  • Published in

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More

Splunk agrees to acquire Phantom

  • Published in

Splunk Inc. is to acquire Phantom Cyber Corporation, a leader in Security Orchestration, Automation and Response (SOAR).

Read More

Trustonic launches IoT device security solution

  • Published in

Blockchain-based Digital Holograms, trusted device provisioning and a modular, secure OS combine to bring trust to constrained IoT devices.

Read More

NEWS

Security threats - beyond the reach of humans?

  • Published in

Cisco 2018 Annual Cybersecurity Report reveals that 39 percent of organizations are reliant on automation, 34 percent are reliant on machine learning, 32 percent are highly reliant on AI.

Read More

NEWS

Cyber security in financial services industry in need of urgent reform

  • Published in

Research reveals the immense challenges frontline IT security teams face which are undermining business continuity and opportunities.

Read More

10 cyber security predictions for 2018

  • Published in

By Ronald Sens, Director EMEA Marketing, A10 Networks.

Read More

World’s first OEM to include a multiple device security solution that protects users against...
Das Dell Netzwerk-Portfolio rund um LAN-, WLAN-, Campus- und Rechenzentrumsumgebungen wird...
The smart connected device (SCD) market posted another quarter of growth in Western Europe, driven...
By 2015, 10 per cent of overall IT security enterprise product capabilities will be delivered in...
Allows companies to maintain ownership and control of encryption keys and enforce data protection...
Awards iGATE a five-year contract valued at $80 million - with a possible one year extension - to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more