NEWS

Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More

NEWS

Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data generation via sensors, to real-time decision support.

Read More

NEWS

Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across all cloud services, optimizing agility.

Read More

NEWS

IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

NEWS

Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes of employee-driven data breaches, their frequency and impact. The research highlights a fundamental gulf between IT leaders and employees over data security and ownership that is undermining attempts to stem the growing tide of insider breach incidents.

Read More

NEWS

ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More

By David Phillips, product manager, Wick Hill.
Corero Network Security has entered into an agreement under the Strategic Alliance Program with...
AlianVault and ManagedMethods among first to join integration initiative.
FireHost has announced trends for the attacks it blocked from its clients’ web applications...
Security and risk management leaders must address eight top trends to enable rapid reinvention in...
Whatever their size, interest, geography and industry – all businesses will benefit from...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more