Cyber security confidence gap

C-level executives at Fortune 500 firms less confident in cyber security risk presentations for boards than IT professionals.

Read More

Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More


Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks and address the priorities set by their CISOs.

Read More


BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever it’s located – in the cloud, on-premise or in hybrid IT systems – using the enterprise-grade IAM capabilities within CA Secure Cloud paired with BT’s extensive managed security...

Read More

Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...
“State of Ransomware Readiness: Facing the Reality Gap” finds surveyed organizations are...
Gemalto has released the latest findings of the Breach Level Index, a global database of public...
CISOs’ roles have taken them beyond what’s expected of security professionals, providing them...
Alert Logic has published the results of a survey conducted amongst 317 security professionals...
The latest edition of Kaspersky’s annual IT Security Economics report reveals the growing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more