VMware 'transforms' Hybrid Cloud security for mobile users

VMware says that it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX(TM) network virtualization and the company's business mobility solutions, AirWatch® by VMware and VMware Horizon®.

Read More

AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More



Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

With 2014 now in full swing, Catalin Cosoi, Chief Security Strategist at Bitdefender, draws on his...
These predictions for 2015 are from Stuart Evans, Chief Technology Officer, at Invu.
SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first...
As the technologies and trends that power digitalization move to center stage, CIOs are being...
Cisco 2018 Annual Cybersecurity Report reveals that 39 percent of organizations are reliant on...
Aligning with one of Gartner’s key trends for 2021 - Cybersecurity Mesh, - “a distributed...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more