iland eliminates cloud compliance barriers

Enhanced offering helps customers prevent data breaches and achieve compliance through advanced security technology and reporting backed by expert consulting team.

Read More

Streamlining risk management, data breach mitigation, and compliance

Nuix has released Nuix Sensitive Data Finder 2.2, an upgrade that further improves the product’s performance and adds visualizations and other analysis features to streamline common tasks and identify high-risk information sooner.

Read More

NEWS

MEPs adopt sensible resolution on EU-US data flows and Privacy Shield

The European Parliament has adopted a resolution that will give businesses and individuals clarity over the flow of transatlantic data, European Conservatives and Reformists shadow rapporteur Timothy Kirkhope MEP, said after the vote.

Read More

NEWS

Global Cyber Alliance sets out plan to tackle top cyber threats

The Global Cyber Alliance (GCA), a non-profit organisation aimed at tackling the cyber threat set up by the New York County District Attorney, City of London Police and the Center for Internet Security, has identified the top four risks to the online world.

Read More


Index aids security benchmarking

Online resource behind benchmark survey promises to help companies measure the effectiveness of cybersecurity and share best practices.

Read More

Shadow IT and a lack of business continuity planning present growing threats.
Alpha Generation Distribution, specialising in proactive security solutions will distribute...
Dell shares inaugural Global Technology Adoption Index showing decision points around technology...
Top business priority is improving efficiency.
76 percent of global survey respondents believe better control of privileged accounts would reduce...
Almost half (44%) of IT & telecoms companies are unaware of the new wide-ranging data...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more