NEWS

Security from device level to the cloud

McAfee MVISION Unified Cloud Edge simplifies adoption of SASE architecture and lowers total cost of ownership for security across the device, web and cloud.

Read More

NEWS

Modern attacks leveraging evasive behaviours

VMware has released the VMware Carbon Black “2020 Cybersecurity Outlook” report, which offers a holistic view at how attackers have evolved, what defenders are doing to keep pace and how security and IT teams can work together in 2020 and beyond.

Read More

NEWS

What to make of the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices and AI algorithms.

Read More


NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

Danger - unauthorised devices in the workplace

1,500 per cent increase in IoT traffic through the Zscaler Cloud highlights dangerous rise in unauthorised devices brought into the workplace.

Read More

Despite 80% of organisations running up to 10 different protection and cybersecurity solutions...
Secure mobile connectivity solution reduces cyber risks for today's global workforce.
OneLogin, the innovator in enterprise identity management, has secured a $13 million round of...
Managed services and cloud computing specialist, Intrinsic Technology, is one of only two providers...
The third quarter of 2015 has seen information and IT systems of different security agencies and...
Brocade has introduced Ruckus Cloudpath™ ES 5.0 software. The new release builds on previous...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more