Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More


Akamai Cloud Security Intelligence is the foundation for new services

Recognising the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its award-winning Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai Intelligent Platform, the engine is used to continuously analyse more than two Petabytes of data related to web security threats. Akamai uses the resulting intelligence to not only continuously update and...

Read More

AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily.

Read More

Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship product to help customers align security policies with business objectives.

Read More

Avast has formed a partnership with one of the world’s largest providers of intelligence for...
Study reveals why companies don’t inform law enforcement about ransomware infections and how...
Organisations say protecting client information is the highest priority.
On average, UK organisations need an additional £1.88m and 22 new IT staff each to shorten the...
Sumo Logic’s Cloud SIEM Enterprise offering includes a rich set of capabilities to ease the...
Leading cybersecurity company protects organizations’ most attacked people from phishing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more