NEWS

IoT is the fastest growing force affecting PKI planning and evolution

Organisations apply stronger PKI security controls due to their increasingly critical role today.

Read More

NEWS

Killchain and attack automation give attackers the advantage

Alert Logic has released its latest cybersecurity analysis, "Critical Watch Report: The State of Threat Detection 2018," which shows cyber attackers are gaining vastly greater scale through new techniques such as killchain compression and attack automation, expanding the range of organisations under constant attack regardless of industry or size.

Read More

NEWS

DigiCert, Gemalto and ISARA partner

Partnership aims to deliver secure, post-quantum-ready PKI with end-to-end roots of trust and safe, reliable key management for next-gen IoT devices.

Read More

NEWS

A hacker's paradise?

Thycotic has released the findings from its 2018 Black Hat conducted survey of more than 300 hackers nearly 70 percent of which help organizations improve security and identify as "white hat hackers."

Read More

NEWS

Video surveillance vulnerability uncovered

Tenable's  research team has discovered a zero-day vulnerability which would allow cybercriminals to view and tamper with video surveillance recordings via a remote code execution vulnerability in NUUO software one of the leading global video surveillance solution providers.

Read More


A new survey has found that two-thirds of business decision-makers (66%) are still not fully...
By Patrick Steiner, Lead Architect at Red Hat.
Over half of remote workers spend up to one day a week connected to unsecured networks.
Businesses focused on ensuring data is kept secure and resilient as they gear up for growth.
In the ever changing and increasingly complex landscape of cyber security, Sophos Labs experts...
Gartner has highlighted the top technologies for information security and their implications for...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more