NEWS

State of Utah projected to save millions of dollars

Orchestrated security approach delivers improved asset intelligence through device visibility and real-time reporting for rapid time to value.

Read More

NEWS

IT security professionals suffer from an image problem

New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom mongers’ or a ‘necessary evil’ by employees.

Read More


NEWS

Information Security Forum tackles tomorrow’s security workforce

The Information Security Forum (ISF), the trusted source that senior security professionals and board members turn to for strategic and practical guidance on information security and risk management, has released Building Tomorrow’s Security Workforce.

Read More

NEWS

Average cost of a cyberattack exceeds $1.6 million

A third of business still don’t have an emergency response plan in place, despite 78% of businesses experiencing service degradation or a complete outage in the last year, up 10% on 2018.

Read More

NEWS

Firewall for Japanese 5G deployment

A major Japanese mobile carrier has selected the A10 Thunder® Convergent Firewall (CFW) Gi/SGi firewall solution for its 5G production network, to support the huge network capacity and throughput of 5G and reduce total cost of infrastructure.

Read More

Respondents expect their transition to the cloud, as part of an organization’s digital...
Retailers turn away from traditional records management in search of analysis and insight.
Softcat has achieved its most advanced Symantec accreditations yet in a leap which cements its...
Cyber attacks cause great harm to the business world due to their evolving nature and it is...
‘IT Trends Report 2015: Business at the Speed of IT’ explores the current state of...
Sophos has introduced Sophos XDR, said to be the industry’s only extended detection and response...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more