Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Mobility benefits put at risk by companies' inattention to work-life balance and security issues

The proliferation of mobile devices is driving an array of positive changes in workplace culture and how we work. But these always-on mini-computers are also upending our sense of “work-life” balance, fanning executive anxieties about security and privacy, and forcing IT departments to overhaul their information-security approaches, according to The personalisation challenge: business culture and mobile security, an Economist Intelligence Unit report, sponsored by HP Networking.

Read More

Grace Shacklady, technical author Of PAS 555, joins IT Governance

IT Governance Ltd, the fast-growing cyber security services business, has announced that Grace Shacklady, technical author of PAS 555 - Cyber Security Risk – Governance and Management, has joined the company as a senior consultant.

Read More



BeyondTrust has unveiled the results of its Federal Cyber-Security Threat Survey Report...
New capabilities support business-driven approach to security policy management.
After strong progress in recent years, organisations must ensure they continue to invest in cyber...
Splunk has introduced innovations across its security portfolio that will help make it easier and...
Swiss-Singapore cyber protection and hybrid cloud storage specialist Acronis has been confirmed as...
Extortion demands grew in 2020, as cyber criminals targeted new online industries.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more