NEWS

Modern attacks leveraging evasive behaviours

VMware has released the VMware Carbon Black “2020 Cybersecurity Outlook” report, which offers a holistic view at how attackers have evolved, what defenders are doing to keep pace and how security and IT teams can work together in 2020 and beyond.

Read More

NEWS

What to make of the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices and AI algorithms.

Read More


NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

MobileIron will integrate Zimperium’s machine learning-based threat detection with...
Proact will be active in Germany as of 1 October this year. The launch will initially take place as...
Ivanti has published new findings from a survey studying the impact of the move to “work from...
Spezialist für Next-Generation-Threat-Protection veröffentlicht Report zur...
Report warns hundreds of terabytes of potentially sensitive corporate data is now stored on USBs...
Network 2 Supplies (N2S) – a leader in IT lifecycle management – has had its contract...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more