NEWS

Research uncovers security’s patching paradox

64% plan to hire for vulnerability response over the next 12 months, yet more talent alone won’t solve the problem.

Read More

NEWS

Trustwave report depicts evolving cybersecurity threat landscape

Trustwave has released the 2018 Trustwave Global Security Report which reveals the top security threats, breaches by industry, and cybercrime trends from 2017.

Read More

NEWS

Leading insurer reduces cyber risk

Firm cites superior visibility into user and host activity as well as integration into broader cybersecurity ecosystem among differentiators in selecting Corvil.

Read More

Files remain overexposed and unprotected

Despite enormous consequences of this addressable challenge, companies continue to expose sensitive information to insider threats, ransomware and other risks.

Read More

Simple and affordable steps can and should be taken by local authorities towards GDPR compliance

Significant fines for non-compliance mean investment towards GDPR is essential, but more can be done to ease the strain.

Read More

Nearly three million UK businesses vulnerable to IoT hacks

New study from ForeScout reveals that almost half of UK IT managers admit to not changing default passwords for IoT devices.

Read More

Check Point secures and streamlines management of NHS Scotland’s sensitive health data in the...
Orchestrated security approach delivers improved asset intelligence through device visibility and...
bluedog Security Monitoring has launched a new compliance module which enables users to check the...
Innovation represents major step forward in the fight against sophisticated phishing, account...
Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions...
Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more