BLOG

Beware email, social media and mobile apps!

As 2016 draws to a close, researchers from Proofpoint have gazed into their crystal ball and predicted what may lie ahead in 2017.

Read More

Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. Study respondents included 505 IT professionals that manage these critical cryptographic assets in the U.S., U.K., France and Germany.

Read More

Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work purposes.

Read More

NEWS

2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the rise of ransomware to the Shadow Brokers, 2016 was an exciting year for the cyber security community, according to RiskIQ.

Read More

Pulse Secure expands Secure Access platform hosting to Europe

New German based instance of cloud based Pulse Workspace and Pulse One fully compliant with stringent EU Data Protection laws.

Read More


More than 8.4 million DDoS attacks targeting IT infrastructures, cloud, mobile networks, and IoT...
Despite the rise of high-profile IoT botnet attacks Mirai and Reaper, nearly half of...
New survey indicates more than two-thirds of European organisations are planning to adopt Zero...
AT&T SASE with Palo Alto Networks delivers comprehensive, converged network and security management.
Report on government cyber security shows phishing, remote working and election security are common...
Partnership aims to deliver secure, post-quantum-ready PKI with end-to-end roots of trust and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more