AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the key security features of Amazon Web Services and provides tips on best practice.

Read More

HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More

Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of authentication available. The Gallagher PIV Solution offers customers a lower total cost of ownership through an industry-leading hardware warranty, the ability to update end devices remotely, and a fully...

Read More


Trustwave plans global expansion in Managed Security Services

Follows the completion of acquisition by Singtel; combines Singtel’s extensive customer reach and resources with Trustwave’s industry-leading security offerings to provide more cutting-edge services.

Read More

Intercity Technology study reveals that on average, IT users feel that IT departments are 21 months...
Alert Logic has received a grant by Invest Northern Ireland in support of its Security Research...
Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of...
Databarracks has been named as one of the first organisations in the UK to become certified with...
Company debuts brand-new eCrime Index showing intensity of cyber-criminal market over time; reveals...
Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more