Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT security professionals during the week of April 20th in San Francisco. The survey data reve­als that most IT security professionals acknowledge they don’t know how to detect or remediate quickly from compromised cryptographic keys and digital certificates, the foundation of trust in our modern, digital world.

Read More


Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.

Read More

Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn, Facebook and Twitter.

Read More

Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT managers agree the rapid pace of technological change is making decisions about IT investment more difficult than 10 years ago. The study, which polled 250 IT decision makers across the UK, found that as a result of this rapid pace of change, 62 per cent of IT decision makers have invested in hardware or software that has never been used by the organisation.

Read More

38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
By Anna Zetterholm, Marketing associate at Keypasco.
Centre of excellence to help defend online safety worldwide.
Nearly half of businesses have static compliance budgets and rely on labour-intensive manual...
MSP re-certifies against the Cloud Industry Forum’s Code of Practice.
The government should look to widen its promotion of initiatives such as the Cyber Essentials...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more