BLOG

Beware email, social media and mobile apps!

As 2016 draws to a close, researchers from Proofpoint have gazed into their crystal ball and predicted what may lie ahead in 2017.

Read More

Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. Study respondents included 505 IT professionals that manage these critical cryptographic assets in the U.S., U.K., France and Germany.

Read More

Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work purposes.

Read More

NEWS

2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the rise of ransomware to the Shadow Brokers, 2016 was an exciting year for the cyber security community, according to RiskIQ.

Read More

Pulse Secure expands Secure Access platform hosting to Europe

New German based instance of cloud based Pulse Workspace and Pulse One fully compliant with stringent EU Data Protection laws.

Read More


Only a quarter (27%) of consumers feel businesses take customer data security very seriously.
Harmony - said to be the industry’s first unified solution for remote work, providing...
Positive Technologies performed instrumental scanning of the network perimeter of selected...
McAfee has introduced significant enhancements to its Secure Access Service Edge (SASE) solution...
Joint solution integrates detection, automated investigations and incident response capabilities to...
The Cybersecurity Resource Allocation and Efficacy (CRAE) Index reports that spending continued to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more