More enterprises plan to strengthen access security with multi-factor authentication

SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication and mobile MFA to accommodate an increasingly mobile workforce.

Read More

Metaways: Worauf Unternehmen bei Open-Source-Lizenzen achten müssen

Im Zuge der NSA-Affäre interessieren sich immer mehr Unternehmen für Open-Source-Software. Der IT-Dienstleister Metaways klärt darüber auf, worauf sie im Umgang mit Open-Source-Lizenzen achten müssen

Read More

Datenpannen, Shitstorms – auch der Mittelstand ist gefährdet

Bei großen Unternehmen wie Facebook [1] oder Vodafone [2] kam es im letzten Jahr zu größeren Datenpannen, bei denen sensible Kundeninformationen betroffen waren

Read More


50 per cent of security professionals fail to secure data

iStorage research finds that half of respondents at Infosec 2014 do not encrypt data on portable devices despite being aware of the potential damage to organisations. Research conducted at Europe's number one information security event Infosec 2014, has revealed that 50% of security professionals do not secure data on portable storage devices such as USBs and external hard drives. This finding comes despite 91% of respondents to the same survey expressing concerns about the potential...

Read More


Encryption-Based threats grow by 260% in 2020.
Damballa, the advanced threat discovery company, has released customer research data that indicates...
RedSeal has introduced enhancements and new integrations for its market leading network modeling...
Flashpoint Professional Service (FPS) helps companies prepare for, as well as, quickly assess...
 Skyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.
BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more