Cryptography advisory board receives a boost

Board will provide expert oversight of encryption schemes for advanced cloud security, and deliver a boost to enterprise adoption of cloud services.

Read More

vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by giving enterprises and service providers visibility, control and threat defences for the agile data centre.

Read More

The reality of rising DDoS attacks

Almost a quarter of European companies (23 per cent) consider DDoS (Distributed-Denial-of-Service) attacks one of their top three business threats, according to a survey conducted by B2B International and Kaspersky Lab.

Read More

State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even confirm whether or not their network has already been breached.

Read More

Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More

Thycotic has introduced its PAM Maturity Assessment, the first tool designed as a strategic...
Kaspersky Lab and SYSGO have showcased a security solution for safety-critical tasks which embeds...
SailPoint Technologies Holdings has unveiled the SailPoint Predictive Identity™ platform, the...
Security challenges can only be met with a steadfast commitment to improving cyber security...
Fujitsu and Check Point Software Technologies to jointly market Check Point Integrated Appliance...
Defence plans should be made around an asset based approach.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more