NEWS

Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More

NEWS

Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals in the UK, Benelux and Nordics, which reveal the latest data points and trends in cybersecurity.

Read More

NEWS

Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.

Read More

BLOG

Cloud encryption: bring your own key is no longer enough

Encryption key management systems are now essential for all companies needing to lockdown data in the cloud, says Matt Landrock, Executive Vice President, Cryptomathic.

Read More

61% of employees globally believe their current cyber security training is ineffective.
Avast research finds over half of SMB IT Decision Makers are more concerned about cyber security...
Huge demand for security automation driven by the growing number and sophistication of cyber...
More executives state responsibility for data security should reside outside of IT.
Cybersecurity specialisation and services linked to the Internet of Things lead the next wave of...
38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more