Cyber London reveals second cohort

Cyber London, Europe’s first dedicated cyber security start-up accelerator and incubator, has revealed the eight start-ups participating in Cyber London’s second programme.

Read More

Firms missing out with do-it-yourself approach to Threat Intelligence

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More


A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

A new weapon in the fight against cyber criminals

Organizations' ongoing defense against cyber attackers has a new weapon: a platform that gives threat analysts the power to gather, share and act on cyber threat intelligence.

Read More

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...
Sophos has announced an extensive update to its award winning Unified Threat Management solution,...
Leading change and configuration auditing platform provides complete visibility and ensures that...
HP Data Privacy Services protect confidential information, secure sensitive data and optimize IT...
Wick Hill named distributor for Avecto.
Security and risk management leaders must address eight top trends to enable rapid reinvention in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more