NEWS

Outpost24 acquires Specops for enhanced user security

Outpost24, an innovator in identifying and managing cybersecurity exposure, has acquired Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million funding from Swedbank Robur and Alcur Fonder.

Read More

NEWS

ExtraHop introduces decryption and threat detection capabilities for Microsoft environments

ExtraHop has expanded decryption support for Microsoft authentication and application protocols, providing high-fidelity detection of malicious activity associated with nearly two-thirds of the most exploited network protocols.

Read More

NEWS

Snyk to acquire CloudSkiff

Snyk has agreed to acquire CloudSkiff, creators of the leading open source tool for drift detection, driftctl.

Read More

NEWS

Quantum introduces Scalar Ransom Block

New feature can be initiated remotely and instantly, ensures data stored on tape is completely offline and secure, provides ultimate level of data security for cyber-resilient archives.

Read More


NEWS

CrowdStrike to acquire SecureCircle

CrowdStrike announces acquisition of SecureCircle to enable customers to gain visibility and control of how data is downloaded, used and shared via the endpoint.

Read More

As cloud services usage - and risk - increases, businesses still lack visibility into data breaches.
Arrow Electronics has signed a distribution agreement with cybersecurity company Bitdefender, to...
Illumio has introduced Illumio CloudSecure®, a new solution that gives organizations agentless...
Half of professionals also admitted concerns around their current cloud providers.
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in...
Through ongoing integration development with RapidFire Tools, Kaseya also announces Kaseya...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more