Mimecast has published the latest Email Security Risk Assessment (ESRA) report, an aggregated analysis of tests that measure the efficacy of widely used email security systems. This quarter’s report found that email delivered with malicious URLs, a recently added part of the testing, has...
Read More
LogRhythm Network Detection and Response’s automation features allow security teams of all sizes to do more with less.
Read More
A10 Networks has announced a new capacity enhancement to its Thunder® 14045 TPS, which delivers industry-leading attack traffic mitigation capabilities. This capacity gain provides the highest performance available in the market with 500 Gbps of defence in one appliance. The smaller form factor...
Read More
Avast has launched Avast Business Secure Web Gateway - said to be the first enterprise-class secure web gateway designed for the needs of small to medium businesses (SMBs).
Read More
Fidelis Elevate is the first platform of its kind to enable organisations to calculate their...
Read More
BlackBerry Cylance has introduced CylancePERSONA, said to be the first proactive, native AI...
Read More
Secureworks has launched its Orchestration and Automation solution to help organisations reduce...
Read More
This acquisition positions NTT Security as one of the most comprehensive pure-play cybersecurity...
Read More
Gartner, Inc. has identified seven emerging security and risk management trends that will impact...
Read More
CrowdStrike brings the power of the cloud-native Falcon platform to Android and iOS, further...
Read More
Aqua 4.0 release also tightens Linux host protection and compliance on the heels of recent...
Read More
Many FTSE 350 boards still don’t understand the impact of a cyber attack on their business.
Read More
Paired with deployment and operation from Spirent SecurityLabs, provides true assessment and...
Read More
Largest ever DevSecOps survey shows 41% of executives not implementing open source governance in...
Read More
New service offerings reinforce critical security controls, assess security weaknesses of...
Read More