2014 will be “The Year of Encryption”

Along with broad-based use of encryption and biometric technologies, expect increased focus on securing enterprise BYOD programs and “bring your own security” trend.

Read More

Spiceworks debuts security integrations

Spiceworks has announced a series of updates that simplify how more than 4 million IT professionals manage their technology environments. The new features are designed to give IT professionals access to the security and help desk tools they need to get their jobs done more efficiently, all from a single management interface.

Read More

AlienVault brings security threat insight to millions

New AlienVault Threat Alerts feature in Spiceworks 7.1 provides IT professionals with real-time, actionable information from the world’s largest crowd-sourced threat intelligence database.

Read More

Measurement and analysis are key

Continuity Software has announced the results of the Continuity Software IT Operations Analytics Benchmark. Based on results collected across a variety of industry verticals - including financial services, healthcare, manufacturing, and retail - the benchmark underscores the importance of operational analytics in meeting IT performance goals.

Read More

Becrypt announces distribution agreement with SYNNEX Corporation

New partnership extends Becrypt’s international footprint, opening up new markets in the USA.

Read More


The new applications will enable organisations to achieve and maintain compliance with the EU...
Attacks will broaden and differentiate to penetrate new vulnerable surfaces.
By David Myers, ADT Fire & Security.
ETIS – The Global Association for Telecommunications has joined forces with Proximus, KPN,...
New Reference Architecture provides validated blueprints for implementing comprehensive web...
If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more