The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

Read More

5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job market, outsourced security, and the Internet of even more Things.

Read More


Dell und Red Hat entwickeln OpenStack-basierte Private-Cloud-Lösungen

Im Rahmen einer erweiterten Zusammenarbeit unterstützen Dell und Red Hat weltweit Unternehmen beim Aufbau hochskalierbarer, OpenStack-basierter Private-Cloud-Lösungen

Read More

Corero appoints new VP of Sales EMEA

Adrian Bisaz appointed to build on Corero’s success in defending against DDoS, and malicious cyber-attacks across EMEA.

Read More

Malware creation hits record high, reaching 10 million new malware strains identified so far in...
Company’s virtual offerings, cloud services match with on-premises deployments to solve...
In a move designed to limit impact on teaching time, increase IT security and encourage more...
New service protects healthcare databases and applications, reducing the scope of compliance and...
A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights...
The world’s largest nature conservation partnership, BirdLife International, is rationalising...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more