NEWS

Managing complexity is the number one security challenge

Global benchmarking study gives visibility into the security infrastructures of more than 400 organisations to find current and future trends for firewalls and emerging networking technologies.

Read More

Harnessing machine learning to fight web application attacks

Alert Logic has introduced key enhancements to the Alert Logic Cloud Defender solution that enable businesses to better defend against web application attacks, the most significant source of breaches for organisations leveraging cloud and hybrid computing infrastructures.

Read More

Breaches linked to ageing federal infrastructure

BeyondTrust has unveiled the results of its Federal Cyber-Security Threat Survey Report 2017.  Based on a comprehensive survey of senior Federal IT professionals, the study exposes an aging Federal computing infrastructure which has led to an environment with an alarmingly high risk of breaches.

Read More

LogRhythm launches Technology Alliance Partner (TAP) programme

Facilitating deeper engagements with key technology integration partners and deliver greater protection across the full threat lifecycle.

Read More

BeyondTrust contributes vulnerability statistics to Verizon report

Verizon’s report finds 81% of breaches leveraged legitimate user passwords and other credentials to breach systems.

Read More


According to The State of Cloud Security 2020, a global survey from next-generation cybersecurity...
Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...
German packaging and materials manufacturer deploys Clavister to secure global IT infrastructure.
‘Breakthrough’ solution addresses DNS server vulnerabilities.
Security leader witnesses increased global demand for comprehensive SS7 Protection as network...
Relationship improves information sharing with innovative research and initiatives.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more