NEWS

State of Utah projected to save millions of dollars

Orchestrated security approach delivers improved asset intelligence through device visibility and real-time reporting for rapid time to value.

Read More

NEWS

IT security professionals suffer from an image problem

New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom mongers’ or a ‘necessary evil’ by employees.

Read More


NEWS

Information Security Forum tackles tomorrow’s security workforce

The Information Security Forum (ISF), the trusted source that senior security professionals and board members turn to for strategic and practical guidance on information security and risk management, has released Building Tomorrow’s Security Workforce.

Read More

NEWS

Average cost of a cyberattack exceeds $1.6 million

A third of business still don’t have an emergency response plan in place, despite 78% of businesses experiencing service degradation or a complete outage in the last year, up 10% on 2018.

Read More

NEWS

Firewall for Japanese 5G deployment

A major Japanese mobile carrier has selected the A10 Thunder® Convergent Firewall (CFW) Gi/SGi firewall solution for its 5G production network, to support the huge network capacity and throughput of 5G and reduce total cost of infrastructure.

Read More

US is top, with Russia second, in list of countries experiencing the most cyber incidents.
Bitglass, the Total Cloud Security company, has released its 2020 BYOD Report, which analyses...
Mimecast has published the latest Email Security Risk Assessment (ESRA) report, an aggregated...
German technology company automates public key infrastructure with Red Hat Ansible Automation...
CIO Strategic Marketing Services / IDG Research Services survey sponsored by Red Hat shows...
According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more