A10 Networks expands portfolio of security solutions

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More


NEWS

Sophos brings synchronized security to endpoints and networks

Sophos has introduced the first synchronized security protection against today’s sophisticated threats with the Sophos Security Heartbeat™ capability of the Sophos XG series of next-generation firewalls and UTMs.

Read More

NEWS

Dangerous devices

Imation has issued new research highlighting that 44 percent of organisations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device stolen.

Read More

The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key developments on the cyber threat landscape in 2016, and provides unique insights into the expected nature of that landscape through 2020, as well as the IT security industry’s likely response.

Read More

Acronis and AFC Ajax, a renowned Dutch professional football club, have signed a multi-year...
Postquantum cryptography and machine learning research initiatives currently underway in...
Despite the perception they are too small to target, SMBs are increasingly vulnerable due to...
AT&T is launching a managed Extended Detection and Response (XDR) offering. The AT&T Managed XDR...
Company’s virtual offerings, cloud services match with on-premises deployments to solve...
Two in three organizations plan to deploy Artificial Intelligence to bolster their defense as soon...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more