NEWS

Bromium endpoint protection and threat intelligence sharing strengthen HP Device as a Service Proactive Security offering

Real-time threat isolation protects against malware introduced through email, browsers and files, providing enterprise-grade defense against threats.

Read More

NEWS

Identify3D deploys Gemalto solution

Digital manufacturing software provider expands its data security with SafeNet Data Protection on Demand cloud-based HSM service.

Read More

NEWS

Malicious intent outweighs technology as biggest threat to personal data

Apricorn, manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB storage devices, has published the results from its latest social media poll which found that sixty five percent of respondents believe that humans pose the biggest threat to their personal data.

Read More

NEWS

Phishing attacks with malicious URLs up 126 percent

Mimecast has published the latest Email Security Risk Assessment (ESRA) report, an aggregated analysis of tests that measure the efficacy of widely used email security systems. This quarter’s report found that email delivered with malicious URLs, a recently added part of the testing, has increased by more than 125 percent in comparison to last quarter’s results.

Read More


NEC Corporation (NEC; TSE: 6701), Infosec Corporation (Infosec), a specialized security company...
The experts at Positive Technologies have released their cybersecurity threatscape findings for the...
Whether on vacation, working from home or on-the-go, an IT professional's work is rarely ever...
Nixu Corporation and Nokia Networks have entered an agreement to collaborate on developing and...
New offerings are designed to disrupt markets, capture opportunities and accelerate business.
451 Research is pleased to announce the hiring of two new members to its growing analyst team:...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more