NEWS

The security of IoT devices relies on secure updates and cyber resiliency

To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group’s (TCG) Internet of Things Work Group, said recently.

Read More

NEWS

Alarming jump in phishing attacks

PhishLabs Threat Trends and Intelligence Report show attacks grow 31.5% year-to-date over 2020, with social media attacks continuing to climb; September more than doubles its phishing activity over the same month last year.

Read More

NEWS

Tanium partners with Deep Instinct

Partnership covers entire endpoint security lifecycle from identification to protection, prevention, response, and recovery.

Read More

NEWS

Majority of organisations have suffered ransomware attack

“State of Ransomware Readiness: Facing the Reality Gap” finds surveyed organizations are confident in their ransomware preparedness despite consistently being the target of attacks.

Read More

NEWS

Ransomware - increase in sophistication and volume

The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families compared to Q2 2021.

Read More


Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...
New Context brings industry-leading, multi-cloud DevSecOps to Copado, enabling enterprises to build...
Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of...
IBM has launched a 10-year initiative to bring Watson and other cognitive systems to Africa in a...
Imperva Sonar platform enables organizations to manage complex and automated cyberattack risks.
Converged infrastructure trend provides technical and business efficiencies for customers and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more