Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More

Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise Random Password Manager (ERPM) and the QualysGuard Security and Compliance Suite, providing customers with secure password management for authenticated scanning for IT security and compliance. Lieberman Software will exhibit this functionality at Qualys Security Conference 2013 in Las Vegas this week.

Read More



More time online and increased volume of cyberattacks is not translating to safer password...
In the run-up to GDPR, new research from the DMA and Acxiom shows that people are increasing...
A new survey of enterprise IT security leaders showed an overwhelming majority--almost 80...
Identity and personal data theft account for 64% of all data breaches.
Security concerns intensify with challenges over remote worker access.
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more