A10 Networks and Webroot partner

A10 customers can satisfy security and regulatory requirements by decrypting SSL traffic while excluding traffic to regulated data and sensitive sites like banking and healthcare.

Read More

Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption...

Read More

IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK market for IT security services and products is estimated to have grown by 8% year-on-year in 2013.

Read More

PCI Compliance contributes to false sense of security

Tripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted by Dimensional and Atomik Research and sponsored by Tripwire. The survey evaluated the attitudes of 407 retail and financial services organizations in the U.S. and the U.K. on a variety of cybersecurity topics.

Read More


Netwrix study dedicated to Sysadmin Day also finds that two thirds (66%) of system administrators...
Cyber firm Rapid7 conducts one of the most comprehensive surveys of the internet and found that...
BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and...
SOSS Volume 11 finds 76% of applications have at least one security flaw.
Bitglass has released its seventh annual Healthcare Breach Report.
Ninety-eight percent of IT professionals consider smart cities at risk for cyber attacks.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more