NEWS

Shadow mining mustn't be overlooked

65 percent of organisations not familiar with shadow mining; only 17 percent ‘very confident’ they can prevent crypto mining on their network.

Read More

NEWS

Thales completes acquisition of Gemalto

With Gemalto, Thales will cover the entire critical decision chain in a digital world, from data generation via sensors, to real-time decision support.

Read More

NEWS

Security and compliance across multi-cloud environments

New CloudFlow solution enables organizations to seamlessly manage security control layers across all cloud services, optimizing agility.

Read More

NEWS

IoT threats: same hacks, new devices

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.

Read More

NEWS

Insider data breaches - what are the causes?

Egress has published the results of its first Insider Data Breach survey, examining the root causes of employee-driven data breaches, their frequency and impact. The research highlights a fundamental gulf between IT leaders and employees over data security and ownership that is undermining attempts to stem the growing tide of insider breach incidents.

Read More

NEWS

ConnectWise launches Security Assessment Tool for MSPs

Company will also resell the Perch Community Defense Platform, purpose built for MSPs.

Read More

35% of IT professionals acknowledge that insider threat is biggest risk to networks.
New solution changes risk management focus from technology to business, eliminating...
In Q1 2021, attackers continued to exploit the pandemic to attack businesses and their IT...
Study of senior business and technology executives shows clear understanding of quantifiable and...
Business leaders are taking major strategic decisions about the future of their businesses based on...
The number of global biometrics smartphone users is expected to reach 471.11 million in 2017 from...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more