NEWS

Security professionals are overconfident in the effectiveness of their security products

Security operations teams face challenges in understanding how their security tools work leading to data breaches, vulnerabilities and wasted time and money.

Read More

NEWS

Powerful backdoor capabilities now available in commoditized ‘off the shelf’ malware

New research underlines potential value of backdoored machines using SSH machine identities, aided by close collaboration between cybercrime and APT groups.

Read More

NEWS

Security scorecard receives recognition

Huntsman Security’s “Essential 8 Scorecard” wins “Best compliance product” and “Best SME security product” at TEISS Awards 2020.

Read More

NEWS

Pattonair puts cyber security front and centre with latest accreditation win

Global aerospace and defence supply chain specialist Pattonair has reinforced its data credentials after achieving an internationally recognised security standard.

Read More

VIDEO

Application-First Security Case Studies

How does App-First Security work in the major verticals? Radhika Mitra joins us to discuss unique regulation and certification concerns, aspects per vertical, and continued investments across verticals like financial, transportation, and gas and oil.

Read More


A new survey by Cybera, the leader in SD-WAN Edge application and security services, has found that...
A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber...
IT defenders face the increasing sophistication of adversaries who are responsible for the growth...
InfoWatch's flagship solution for corporate protection against data leaks and internal threats,...
Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company...
Trend Micro survey finds 88% of surveyed organizations have accelerated their cloud migration, but...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more