NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

McAfee to acquire Light Point Security

Integrating remote browser isolation capabilities into MVISION UCE enables a complete implementation of SASE Architecture.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Beating BEC

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection.

Read More

NEWS

Global partners receive recognition

FireMon names top performing channel and distributor partners as “Ignite Partner of the Year” award winners.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

IoTopia provides a blueprint for device makers to secure IoT devices and services across all...
Venafi has published survey results highlighting the challenges of improving software supply chain...
Report provides five-year threat retrospective, GPU malware assessment, and techniques for...
Total data market will nearly double in size through 2019.
Analysis of enterprises piloting the program shows that social media and application control...
Delivers industry’s first visibility solution that includes stateful SSL decryption to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more