VIDEO

Apple devices in the security spotlight - Addigy interview

Addigy’s Founder and CEO, Jason Dettbarn, explains how Apple devices are attracting increasing levels of security attacks, and what measures the company takes to counter these threats, as well as outlining how Addigy can help its customers to be confident and secure when using its Apple-based solutions.

Read More


BLOG

Why AI is now table-stakes in cybersecurity

By Dr. Sven Krasser, Senior Vice President and Chief Scientist, CrowdStrike.

Read More




Tripwire has publisjed the results of a study examining the security practices and concerns of container technology. Tripwire's study, conducted in partnership with Dimensional Research in November 2018, surveyed 311 IT security professionals who manage environments with containers at companies with over 100 employees.
Without regulation, the IoT security threat will continue to grow in 2019.
A new report published by CREST looks for solutions to the increasing problems of stress and burnout among many cyber security professionals, often working remotely in high-pressure and under-resourced environments. CREST – the not-for-profit body that represents the technical security industry including vulnerability assessment, penetration testing, incident response, threat intelligence and SOC (Security Operations Centre) – highlights its concerns and says that more needs to be done to identify the early stages of stress and provide more support.
Ponemon research finds that IT Security underestimates the value of business assets by over 50% .
Spirent Communications has warned of the increased likelihood of disruptions this year to a wide variety of civil and military applications relying on global navigation satellite systems (GNSS) – GPS, GLONASS, Galileo, and BeiDou. 
Phishing attacks are regarded as the greatest cyber threat.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more