NEWS

Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified identity management across cloud, mobile and data centre, at Cloud Expo Europe last week in London.

Read More

NEWS

AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach.

Read More

NEWS

Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.

Read More



Enterprise Immune System technology to be integrated in BT’s security offerings

BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the global market.

Read More

Zero Trust Network Access ends VPN attacks and more than two-thirds of organisations are taking...
Data theft is also a key concern, mirroring industry concerns.
Ongoing investment in senior appointments as company expands offensive security and managed...
Phishing attacks continue to rise in volume and impact in 80 percent of businesses surveyed, with...
Although 84% plan to increase IT security spending, report indicates greatest spending plans...
Security researchers at WatchGuard Technologies warn of ransomworms, IoT botnet zombies,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more