Enterprise security experts prefer integrated, cloud-delivered security platforms

  • Published in

Nearly all IT security decision makers—98%—recognise integrated cloud security platforms as delivering better functionality than point solutions.

Read More

Senior management have unrealistic expectations about IT downtime

  • Published in

Report identifies gap between IT and senior management expectations.

Read More

British Crime Survey reveals the true scale of fraud and cyber crime

  • Published in

The results for the British Crime Survey for the first time show that fraud and cyber crime are the most prevalent crimes committed against people in England and Wales.

Read More

NEWS

Report reveals the dangers of the Dark Web

  • Published in

Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal marketplaces.

Read More

Rapid7 acquires Logentries

  • Published in

Rapid7 has acquired RevelOps, Inc. d/b/a Logentries (Logentries), a leading provider of machine data search technology.

Read More

Centrify joins Cloud Security Alliance

  • Published in

Centrify joins Cloud Security Alliance as a corporate member, brings expertise in strengthening enterprise security by managing and securing user identities from cyberthreats.

Read More

The Global Cyber Alliance (GCA), a non-profit organisation aimed at tackling the cyber threat...
Resilient’s Incident Response Platform will enable Teva to respond faster and more...
Databarracks, a provider of award winning business continuity services,...
In addition, 27% of educational organisations suffered a ransomware attack, and 49% of them needed...
Sophos has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition...
Cigital, Inc. will be acquiring cloud-based application security testing provider, iViZ Security....
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more