NEWS

Outpost24 acquires Specops for enhanced user security

Outpost24, an innovator in identifying and managing cybersecurity exposure, has acquired Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million funding from Swedbank Robur and Alcur Fonder.

Read More

NEWS

ExtraHop introduces decryption and threat detection capabilities for Microsoft environments

ExtraHop has expanded decryption support for Microsoft authentication and application protocols, providing high-fidelity detection of malicious activity associated with nearly two-thirds of the most exploited network protocols.

Read More

NEWS

Snyk to acquire CloudSkiff

Snyk has agreed to acquire CloudSkiff, creators of the leading open source tool for drift detection, driftctl.

Read More

NEWS

Quantum introduces Scalar Ransom Block

New feature can be initiated remotely and instantly, ensures data stored on tape is completely offline and secure, provides ultimate level of data security for cyber-resilient archives.

Read More


NEWS

CrowdStrike to acquire SecureCircle

CrowdStrike announces acquisition of SecureCircle to enable customers to gain visibility and control of how data is downloaded, used and shared via the endpoint.

Read More

Weaponisation of DDoS sees British companies impacted lose average of £140,000 due to DDoS...
Hackers exploit lack of IT investment to target scientific, medical, economic and defence research.
Palo Alto Networks has introduced a number of enhancements to Prisma® Cloud, the industry’s only...
Neustar has published “DDoS & Cyber Security Insights,” an in-depth research report that...
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Tripwire has publisjed the results of a study examining the security practices and concerns of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more