TechData teams with iPass

Tech Data has form a pan-European agreement with iPass Inc. (Nasdaq: IPAS), a leading provider of global mobile connectivity, to distribute its intelligent connection management and Wi-Fi service offerings.

Read More

Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other devices. Exabeam Entity Analytics discovers the normal behaviour of medical, industrial, networking, home and mobile devices, and uses that baseline to alert security teams when unusual events occur.

Read More

NEWS

DigiCert selected to provide Root CA for AeroMACS

DigiCert has been selected to host the Root CA for Aeronautical Mobile Airport Communication System (AeroMACS), the only wireless technology that has been validated by major international regulatory bodies to support the safety and regularity of flight.

Read More


Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More

NEWS

Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More

New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
57% of organizations are prioritizing secure cloud migrations and 48% are looking to implement Zero...
New survey finds insider threats are on the rise, despite organizations’ focus on defending...
Blue Coat Systems, Inc. has introduced its Business Assurance Technology blueprint. The five...
Intel Security report shows majority of IT budgets will focus on cloud, indicates need for...
Comstor to deliver SimpliVity’s OmniStack Integrated Solution with Cisco UCS that improves...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more