NEWS

Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More

NEWS

Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data generation via sensors, to real-time decision support.

Read More

NEWS

Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across all cloud services, optimizing agility.

Read More

NEWS

IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

NEWS

Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes of employee-driven data breaches, their frequency and impact. The research highlights a fundamental gulf between IT leaders and employees over data security and ownership that is undermining attempts to stem the growing tide of insider breach incidents.

Read More

NEWS

ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More

Secure@Source empowers customers to execute data-driven digital transformation with confidence and...
A new industry study has revealed that a shocking 46 per cent of IT managers are not aware of PBX...
Leading sports betting brand turns to wire data analytics to improve network and application...
Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks...
According to research from Cisco, critical company data is at risk in the UK as a result of...
Findings underscore the need for retrospective analysis to reduce Time to Detection.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more