Symantec integrates Blue Coat Threat Intelligence into its Global Intelligence Network

Combining threat data results in 500,000 additional attacks being blocked for Symantec customers every day.

Read More

Simplifying security and policy management

Brocade has introduced Ruckus Cloudpath™ ES 5.0 software. The new release builds on previous BYOD onboarding capabilities to create a complete integrated security and policy management platform. Cloudpath ES 5.0 software enables IT organisations of any size to easily establish secure, policy-based access for wired and wireless devices.

Read More

Check Point releases cyber-security predictions for 2017

Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in connected and mobile devices will add to the complexity of IT security in 2017.

Read More

NEWS

Unhealthy report for medical records security

McAfee Labs finds stolen medical records available for sale from $0.03 to $2.42 per record.

Read More

ThreatConnect and Symantec collaborate

ThreatConnect now utilises Symantec DeepSight Advanced IP and URL reputation feeds.

Read More

Common enterprise IoT devices are hackable in under three minutes

In-depth analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks.

Read More

Two thirds are now checking SMEs’ security training credentials, over one third make them part of...
Virtual learning platform provides easily accessible cyber war scenarios that...
2021 BYOD Security Report reveals security teams continue to lack visibility and technology needed...
SOSS Volume 11 finds 76% of applications have at least one security flaw.
The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...
InfoWatch's flagship solution for corporate protection against data leaks and internal threats,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more