Study shows technology use and risks outpacing IT audit

Survey results find companies challenged by variety of technology issues, including security, governance and social media.

Read More


Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec Messaging Gateway, network threat protection for Mac.

Read More

Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and Information Technology Center (ZIVIT), the internal IT service provider for the Federal Revenue Administration and other federal authorities in Germany. The framework agreements are multi-year deals with a volume of up to 4,840 man-months.

Read More


Blue Coat empowers business with Advanced Threat Protection solution

Blue Coat Systems, Inc. has unveiled the new Blue Coat Advanced Threat Protection solution, which is purpose-built to bridge the gap in security organizations between day-to-day operations, incident containment and resolution. The new solution is the first to deliver a comprehensive Advanced Threat Protection lifecycle defense that fortifies the network by blocking known threats, proactively detecting unknown and already-present malware and automating best practices for incident containment...

Read More

By Steve Harcourt, Senior Information Security Consultant, Redstor.
Resilient’s Incident Response Platform will enable Teva to respond faster and more...
Cyber Essentials should become de facto standard for doing business in the UK, says APMG.
The Information Commissioner’s Office (ICO) has published a report highlighting how...
Enhanced offering helps customers prevent data breaches and achieve compliance through...
Only 41% of privileged accounts are assigned to permanent employees of the business with the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more