NEWS

Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More

NEWS

Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data generation via sensors, to real-time decision support.

Read More

NEWS

Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across all cloud services, optimizing agility.

Read More

NEWS

IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

NEWS

Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes of employee-driven data breaches, their frequency and impact. The research highlights a fundamental gulf between IT leaders and employees over data security and ownership that is undermining attempts to stem the growing tide of insider breach incidents.

Read More

NEWS

ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More

New data from Extreme Networks reveals that IoT is barreling toward the enterprise, but...
Award-winning Unisys Stealth technology delivers micro-segmentation on the Amazon Web Services...
RiskIQ has launched its RiskIQ Illuminate Internet Intelligence Platform, the only security...
While 87% of IT decision-makers feel their organisation’s perimeter security is effective at...
Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...
Kaspersky Lab has announced its latest virtualisation security solution, Kaspersky Security for...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more