A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More


NEWS

Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated threats with the Sophos Security Heartbeat™ capability of the Sophos XG series of next-generation firewalls and UTMs.

Read More

NEWS

Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device stolen.

Read More

The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key developments on the cyber threat landscape in 2016, and provides unique insights into the expected nature of that landscape through 2020, as well as the IT security industry’s likely response.

Read More

Mitek’s digital identity verification solution helps Ajax streamline the online experience and...
2019 Cybersecurity Workforce Study also examines motivations and career paths of cybersecurity...
Record numbers of job seekers expected to lose sight of who holds their personal information.
Partnership to deliver advanced cyber security and threat prevention solutions to maximize customer...
With LogRhythm Cloud, security analysts get the full analyst experience of an award-winning...
City gains continuous visibility and actionable context for network threats through...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more