Cyber security confidence gap

C-level executives at Fortune 500 firms less confident in cyber security risk presentations for boards than IT professionals.

Read More

Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More


Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks and address the priorities set by their CISOs.

Read More


BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever it’s located – in the cloud, on-premise or in hybrid IT systems – using the enterprise-grade IAM capabilities within CA Secure Cloud paired with BT’s extensive managed security...

Read More

Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
Security concerns intensify with challenges over remote worker access.
The severity of cyber-breaches has become more and more intense in recent years. As a result,...
Only 41% of privileged accounts are assigned to permanent employees of the business with the...
Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases...
Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more