NEWS

Outpost24 acquires Specops for enhanced user security

Outpost24, an innovator in identifying and managing cybersecurity exposure, has acquired Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million funding from Swedbank Robur and Alcur Fonder.

Read More


NEWS

CrowdStrike to acquire SecureCircle

CrowdStrike announces acquisition of SecureCircle to enable customers to gain visibility and control of how data is downloaded, used and shared via the endpoint.

Read More

NEWS

Clavister completes Omen Technologies acquisition

Clavister, a leader in European carrier-grade cybersecurity solutions for mission-critical applications, has completed the strategic acquisition of Omen Technologies AB – a provider of a highly innovative AI-driven cybersecurity technology – to enhance the company’s portfolio and to tap into the fast-growing AI market. A purchase price of 15 MSEK will be paid with MSEK 3.15 in cash and with MSEK 11,85 in newly issued shares in Clavister. Clavister has today in a separate press release...

Read More

NEWS

The year of ransomware continues

148% surge in global ransomware attacks (470 million) year to date, making 2021 the worst year SonicWall has ever recorded.

Read More

IBM Security has published the results of its annual study examining the financial impact of data...
Lack of internal skills and access to better technology driving UK businesses to partner with...
The importance, role and functionality of data centres will change over the next five years,...
Iron Mountain-Studie: Mehr als die Hälfte der deutschen Büropendler schauen ihrem...
$400mn agreement sees HCL take prime responsibility for running infrastructure and application...
Establishing confidence in IT processes and controls is important, but audit and assurance...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more