NEWS

Almost 10 percent of IT assets are vulnerable to exploitation

eSentire has released its Q1 2019 Quarterly Threat Report which reveals that 8% of externally-facing IT assets are susceptible of being exploited by a high or critical severity vulnerability as classified by the Common Vulnerability Scoring System (CVSS) v3.0 used by the National Vulnerability Database (NVD).

Read More

NEWS

Plans for zero trust projects

UK large enterprises use the most security tools although 1 in 5 in the DACH region plan to increase security spending by over 25%.

Read More

NEWS

Vectra raises $100 million

Financing to drive further global expansion in the $12.7 billion cloud security market.

Read More

NEWS

Critical shift in security responsibilities

As C-level executives engage more frequently in incident response and threat hunting, more IT professionals are missing security events and alerts due to poor legacy app integrations.

Read More

NEWS

Imperva to acquire Distil Networks

Imperva will integrate the Distil Networks’ solution into the Imperva security stack to deliver complete protection for applications and APIs, wherever they reside.

Read More

NEWS

BeyondTrust publishes 2019 Privileged Access Threat Report

BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and improved integration are vital to tackling the modern threat landscape.

Read More

Over 84% of organisations in Europe use or plan to use digitally transformative technologies, but...
The Telco Security Alliance has announced new collaborative efforts designed to further enhance the...
New research from Tanium suggests UK firms have a long way to go in building the business...
SentinelOne, the autonomous cybersecurity platform company, has introduced its next generation...
The number of global biometrics smartphone users is expected to reach 471.11 million in 2017 from...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more