VMware 'transforms' Hybrid Cloud security for mobile users

VMware says that it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX(TM) network virtualization and the company's business mobility solutions, AirWatch® by VMware and VMware Horizon®.

Read More

AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More



Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

By Jeff Kukowski, Chief Operating Officer, SecureAuth.
Half of first-time security analysts working in Security Operations Centres (SOCs) plan to leave...
Real-time console details social media threats, risk trends and security effectiveness for...
The Institution of Engineering and Technology (IET) has launched a new guide, Code of Practice:...
2020 (ISC)2 Cybersecurity Workforce Study chronicles the resiliency, outlook and perseverance of...
Addressing customers' needs to combat zero-day attacks and advanced persistent threats (APTs),...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more