BLOG

Enhancing security in an age of supply chain threats

  • Published in

By Michael Smith, field CTO, Vercara.

Read More

BLOG

Improving your security processes - where to put your focus for real world results

  • Published in

By Paul Baird, Chief Technical Security Officer, Qualys.

Read More

BLOG

The under-appreciated value of Purple Teaming

  • Published in

By Max Corbridge, Senior Security Consultant, JUMPSEC.

Read More

VIDEO

Zero Trust Authentication (ZTA) promises a password-less future

  • Published in

Jasson Casey, CTO, Beyond Identity, discusses the company’s development of Zero Trust Authentication, which looks set to be a key component of a wider, truly optimised enterprise Zero Trust Security solution. He emphasises that, while detection and response has a role to play, there needs to be a renewed focus on the prevention part of any meaningful cybersecurity strategy.

Read More

NEWS

F5 safeguards digital services

  • Published in

Enhanced API defences, granular machine learning capabilities, and new managed service offerings provide comprehensive protection across distributed environments.

Read More

NEWS

Vulnerable application code a case for concern

  • Published in

Research revealed at RSA Conference also finds a startling 86% of software developers and AppSec managers have knowingly deployed vulnerable code.

Read More

Forcepoint Dynamic Edge Protection’s new suite of SASE solutions, including Cloud Security...
Leading digital marketing and ecommerce provider extends long-standing relationship with Clavister...
International risk map ranks 170 countries on data privacy.
RSA Security survey uncovers growing disconnect between consumers and businesses as companies...
OVHcloud, the European leader in cloud computing, has acquired BuyDRM, an American company...
Zscaler has released the Zscaler ThreatLabz 2024 Phishing Report, which analyzes 2 billion blocked...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more