Bridging the gap between service management and cyber resilience

Solutions enable organisations to assess vulnerability, fortify response to cyber threats and protect strategic business assets.

Read More

Transforming DDoS mitigation service

Neustar has introduced enhancements to Neustar SiteProtect, a fast, flexible, global cloud-based DDoS mitigation service. The new benefits and features of Neustar SiteProtect enhance its automation, traffic flows, management and visibility to deliver the greatest speed, flexibility, capabilities and expertise to organizations struggling to mitigate DDoS attacks.

Read More

NEWS

One in four companies have no cyber security plans

One in four European companies would be significantly exposed in the event of a cyber-attack, according to data from DLA Piper, the global law firm.

Read More


Cracks in the cloud supply chain could represent a threat to GDPR compliance

Due diligence and regular supplier audits critical to stop businesses falling foul of the upcoming GDPR.

Read More

Have you been turned into a Zombie?

Norton by Symantec has  revealed which cities  unwittingly played host to the most ‘zombies’, also known as ‘bot’-infected devices, such as PCs, Macs, smartphones, tablets and connected home devices, across Europe, the Middle East and Africa (EMEA) last year.

Read More

Study also reveals security professionals overwhelmingly view insider threats as a dangerous...
Response and recovery have significant impact on 58% of targeted businesses.
Provides a 360-degree visibility into the threat landscape and protects from malware & ransomware...
Seventy-five percent of organisations have expressed concerns about bot traffic (bot robots and...
Gigamon Hawk delivers pervasive visibility across the digital enterprise.
The Symantec Cloud Security Platform ensures information security and protects against threats...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more