WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones?

Read More

Cloud feeds on Cloud

According to a recent independent pan-European survey, cloud-based identity and access management could give UK organisations, negative about the cloud, the confidence to adopt cloud services and become tomorrow’s cloud evangelists.

Read More

The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

Read More

5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job market, outsourced security, and the Internet of even more Things.

Read More


Aqua Nautilus researchers reveal 1/3 of attacks go undetected in runtime.
The third quarter of 2015 has seen information and IT systems of different security agencies and...
Trend Micro intercepted a surge in malware, phishing and credential theft.
Trend Micro has launched Trend Micro Cloud One, a security services platform for organizations...
With the majority of companies believing the future of work will be remote or “hybrid”, Tessian...
As we approach the 10th European Cyber Security Awareness Month, it’s never been more important...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more