NEWS

Critical shift in security responsibilities

As C-level executives engage more frequently in incident response and threat hunting, more IT professionals are missing security events and alerts due to poor legacy app integrations.

Read More

NEWS

Cybercrime may be significantly under-reported

While attack vectors remain largely the same year over year, attack volume will increase and cybercrime may be vastly underreported, according to the 2019 State of Cybersecurity Study from global IT and cybersecurity association ISACA.

Read More

NEWS

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.

Read More

NEWS

LogRhythm releases cloud-based NextGen SIEM Platform

With LogRhythm Cloud, security analysts get the full analyst experience of an award-winning platform with the benefits of Software as a Service (SaaS).

Read More

NEWS

C-Suite beware: you are the latest targets of cybercrime

C-level executives increasingly and proactively targeted by social breaches – correlating to a rise of social-engineering attacks with financial motivation.

Read More


Cisco has introduced new offerings to embed security throughout the extended network – from...
McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new...
Centrify encourages businesses to increase their Identity and Access Management maturity to...
Worldwide security software revenue totaled $19.9 billion in 2013, a 4.9 percent increase from 2012...
Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal...
Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more