NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

McAfee to acquire Light Point Security

Integrating remote browser isolation capabilities into MVISION UCE enables a complete implementation of SASE Architecture.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Beating BEC

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions that address business email compromise (BEC) and email account compromise (EAC) attacks by combining Proofpoint’s leading secure email gateway, advanced threat protection, threat response, email authentication, security awareness training, and cloud account protection.

Read More

NEWS

Global partners receive recognition

FireMon names top performing channel and distributor partners as “Ignite Partner of the Year” award winners.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

Increases productivity and efficiency by 15-20%.
New Training Centre and new Professional Services Manager role at Wick Hill, as the VAD provides...
Report by Trend Micro identifies London’s ‘blackspots’ where data is at risk to...
Cylance, the company that is using artificial intelligence to proactively prevent advanced...
Defence system upgraded to protect enterprises from the next evolution of DDoS and application...
Ping Identity has released results of the Ping Identity 2018 Consumer Survey: Attitudes and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more