NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

McAfee to acquire Light Point Security

Integrating remote browser isolation capabilities into MVISION UCE enables a complete implementation of SASE Architecture.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Beating BEC

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection.

Read More

NEWS

Global partners receive recognition

FireMon names top performing channel and distributor partners as “Ignite Partner of the Year” award winners.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely...
Bromium’s Protected App builds a wall around critical applications on the endpoint and secures...
BAE Systems Applied Intelligence is bringing cloud-based cyber security to commercial organisations...
Industry experts talk cyber security for Data Privacy Day 2020.
CEOs must empower IT managers to make the right decision for the business.
More than half of small businesses in the UK are unprepared for data breaches, CSID survey finds...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more