NEWS

Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified identity management across cloud, mobile and data centre, at Cloud Expo Europe last week in London.

Read More

NEWS

AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach.

Read More

NEWS

Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.

Read More



Enterprise Immune System technology to be integrated in BT’s security offerings

BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the global market.

Read More

Partnership drives proactive security approach inside global organisations, closes detection...
Imperva will integrate the Distil Networks’ solution into the Imperva security stack to deliver...
BT and Intel Security have formed a strategic agreement to create new solutions to help...
Firm cites superior visibility into user and host activity as well as integration into broader...
Panda Cloud Fusion is an integrated solution to protect, manage and support all devices on the IT...
58% of digital transactions now originate from mobile devices.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more