Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Mobility benefits put at risk by companies' inattention to work-life balance and security issues

The proliferation of mobile devices is driving an array of positive changes in workplace culture and how we work. But these always-on mini-computers are also upending our sense of “work-life” balance, fanning executive anxieties about security and privacy, and forcing IT departments to overhaul their information-security approaches, according to The personalisation challenge: business culture and mobile security, an Economist Intelligence Unit report, sponsored by HP Networking.

Read More

Grace Shacklady, technical author Of PAS 555, joins IT Governance

IT Governance Ltd, the fast-growing cyber security services business, has announced that Grace Shacklady, technical author of PAS 555 - Cyber Security Risk – Governance and Management, has joined the company as a senior consultant.

Read More



Four in five (82%) businesses remain concerned about the security risks of employees working...
Aqua integrates with Datadog to give DevOps teams real-time security metrics and events.
HP’s commitment to data-centric security was demonstrated by its recent acquisition of...
Leading developer of next-generation cybersecurity software now provides enhanced security...
Bitdefender enters the second half of 2018 announcing a series of strategic investments including...
Research indicates an urgent need for newer SIEM technologies that increase SOC analyst...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more