NEWS

Security professionals are overconfident in the effectiveness of their security products

Security operations teams face challenges in understanding how their security tools work leading to data breaches, vulnerabilities and wasted time and money.

Read More

NEWS

Powerful backdoor capabilities now available in commoditized ‘off the shelf’ malware

New research underlines potential value of backdoored machines using SSH machine identities, aided by close collaboration between cybercrime and APT groups.

Read More

NEWS

Security scorecard receives recognition

Huntsman Security’s “Essential 8 Scorecard” wins “Best compliance product” and “Best SME security product” at TEISS Awards 2020.

Read More

NEWS

Pattonair puts cyber security front and centre with latest accreditation win

Global aerospace and defence supply chain specialist Pattonair has reinforced its data credentials after achieving an internationally recognised security standard.

Read More

VIDEO

Application-First Security Case Studies

How does App-First Security work in the major verticals? Radhika Mitra joins us to discuss unique regulation and certification concerns, aspects per vertical, and continued investments across verticals like financial, transportation, and gas and oil.

Read More


Length of investigations, limited resources, and lack of context put security professionals at a...
Two-thirds of organisations waste upwards of $88k per year paying IT security staff to fix...
Ping Identity has released results of the Ping Identity 2018 Consumer Survey: Attitudes and...
Awake Security, the network detection and response (NDR) security division of Arista Networks, has...
Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions...
More proactive use of more sophisticated anti hacking tools against among the latest Cyber...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more