Voltage SecureData z/Protect provides reliable, standards-based protection of sensitive data on IBM mainframes

Voltage Security has announced significant enhancements to Voltage SecureData z/Protect™ that make it easy to implement and manage data protection on z/OS, natively and with full interoperability with other Voltage SecureData™ components. The new Voltage SecureData z/Protect continues the evolution of Voltage’s native z/OS solution, adding advanced features requested by customers engaged in some of the largest data protection projects in the world.

Read More

Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption...

Read More

IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK market for IT security services and products is estimated to have grown by 8% year-on-year in 2013.

Read More



Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer...
Bitdefender has released the 2020 Consumer Threat Landscape Report, revealing top cybersecurity...
44% of decision makers are spending a day each week dealing with cybersecurity issues.
One in two (53%) organisations are exposed to undue data security risk thanks to current procedures...
The latest edition of Kaspersky’s annual IT Security Economics report reveals the growing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more