NEWS

Modern attacks leveraging evasive behaviours

VMware has released the VMware Carbon Black “2020 Cybersecurity Outlook” report, which offers a holistic view at how attackers have evolved, what defenders are doing to keep pace and how security and IT teams can work together in 2020 and beyond.

Read More

NEWS

What to make of the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices and AI algorithms.

Read More


NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

NEWS

Many organizations still sacrifice security

The third annual Verizon Mobile Security Index takes a deep dive into the state of mobile security, looking at different types of threats and offering tips to protect your environment.

Read More

By David Gibson, VP at Varonis Systems.
Cisco Security’s open and integrated platform approach is enhanced with new zero trust, cloud,...
New solution offers an automated workflow to discover, protect and control your data using...
Latest research suggests IT leaders are struggling to convince their colleagues that they can help...
HP has been selected by DreamWorks Animation SKG, Inc. (Nasdaq: DWA) to deliver the technology...
Online resource centre with sales, marketing and training tools will empower Partners to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more