NEWS

Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data generation via sensors, to real-time decision support.

Read More

NEWS

Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across all cloud services, optimizing agility.

Read More

NEWS

IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

NEWS

Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes of employee-driven data breaches, their frequency and impact. The research highlights a fundamental gulf between IT leaders and employees over data security and ownership that is undermining attempts to stem the growing tide of insider breach incidents.

Read More

NEWS

ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More

NEWS

Certificate-related outages - cause for concern

Global CIOs admit certificate-related outages routinely impact critical business applications and services.

Read More

New CloudFlow solution enables organizations to seamlessly manage security control layers across...
NTT Com Security and Fortine have entered into a formal partnership to provide expert security...
New ‘File Delete’ feature strengthens Cb Protection as a direct control for PCI DSS...
New Pulse Zero Trust Access (PZTA) service enhances productivity, simplifies management and...
Trusteer has completed a five week research study on computer malware with 10 student interns at...
The recent DCS Awards event, organised by Angel Business Communications, was a great opportunity...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more