AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the key security features of Amazon Web Services and provides tips on best practice.

Read More

HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More

Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of authentication available. The Gallagher PIV Solution offers customers a lower total cost of ownership through an industry-leading hardware warranty, the ability to update end devices remotely, and a fully...

Read More


Trustwave plans global expansion in Managed Security Services

Follows the completion of acquisition by Singtel; combines Singtel’s extensive customer reach and resources with Trustwave’s industry-leading security offerings to provide more cutting-edge services.

Read More

CA Technologies has introduced new data protection enhancements to CA Data Content Discovery and...
SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...
ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...
Overwork and burnout are very real issues for the IT security industry in 2020, according to the...
2017 has been an interesting year for cyber security. With hacks still dominating the headlines...
Nearly half of organisations are afraid they won’t meet the requirements of the General...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more