BLOG

Beware email, social media and mobile apps!

As 2016 draws to a close, researchers from Proofpoint have gazed into their crystal ball and predicted what may lie ahead in 2017.

Read More

Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. Study respondents included 505 IT professionals that manage these critical cryptographic assets in the U.S., U.K., France and Germany.

Read More

Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work purposes.

Read More

NEWS

2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the rise of ransomware to the Shadow Brokers, 2016 was an exciting year for the cyber security community, according to RiskIQ.

Read More

Pulse Secure expands Secure Access platform hosting to Europe

New German based instance of cloud based Pulse Workspace and Pulse One fully compliant with stringent EU Data Protection laws.

Read More


79% of CIOs are concerned that users might ignore IT policies and guidelines, increasing security...
UK SME’s are at risk of 65,000 cyber security attacks daily – with around 4,500 of these being...
Behaviour-based, real-time endpoint protection and remediation to be embedded in TeamViewer Remote...
CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth...
Research by the Ponemon Institute flags challenge of intensifying risks and reactive security...
RSA Security survey uncovers growing disconnect between consumers and businesses as companies...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more