Logo

The last rites of traditional IT security

  • Published in

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.

Read More

Malware creation hits record-high numbers in 2013, according to PandaLabs Q3 Report

  • Published in

Malware creation hits record high, reaching 10 million new malware strains identified so far in 2013.

Read More

UK companies must do more to tackle cyber threat

  • Published in

The UK's top companies are not considering cyber risks in their decision making, a new survey from the Department for Business, Innovation and Skills has revealed.

Read More

Trend Micro Partners with United Nations’ International Telecommunication Union

  • Published in

Relationship improves information sharing with innovative research and initiatives.

Read More

Getting physical with data centre security

  • Published in

By David Myers, ADT Fire & Security.

Read More

Culture of carelessness poses security threat to UK businesses

  • Published in

Report by Trend Micro identifies London’s ‘blackspots’ where data is at risk to hackers and thieves.

Read More

Okta, CrowdStrike, Netskope, and Proofpoint to deliver integrated product solutions, advanced...
Research from Netacea reveals businesses don’t understand up to half of the traffic on their...
EXIN Holding BV and Security Academy BV are very pleased to strengthen their partnership in the...
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on...
State of Industrial Cybersecurity report reveals only 21% of organizations achieved full maturity...
Greater user access control combined with granular security at the document library level, are just...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more