DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to security.

Read More

BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for addressing the challenges of privileged access management.

Read More

CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically manages and secures privileged credentials for cloud orchestration and automation tools.

Read More

BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies, cultivating technology integration for enhanced security and product development.

Read More

A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity for individual endpoints and users from the data centre to the cloud by incorporating cutting-edge advanced threat protection for encrypted traffic.

Read More

Gigamon fortifies security analytics with certificate metadata

Gigamon’s metadata generation engine enables faster detection of attacks that leverage falsified certificates.

Read More

As central banks embrace prospect of digital currencies, ensuring hardened security a foremost...
New service, leveraging analysis from Qualys researchers, delivers a ransomware focused,...
Global technology provider Arrow Electronics has formed a Pan-European distribution agreement with...
New figures from F5 Labs report 64% rise in attacks and greater tactical diversity from...
Layer 7 visibility, inter-provider signalling and orchestrated mitigation support greater DDoS...
Training remains a critical form of defence against cyber-attacks.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more