Trustwave introduces Proactive Threat Hunting Service

Trustwave has introduced enhanced managed security and professional services designed to help short-circuit an attacker’s activities by detecting cybersecurity threats much earlier and then shutting them down before real damage is done.

Read More

NEWS

Addressing Cloud security challenges

The Symantec Cloud Security Platform ensures information security and protects against threats across the cloud spectrum.

Read More

Intel Security mends cybersecurity fragmentation with unifying strategy

Offering integrated and automated solutions, expansive partner ecosystem, advanced architecture with cross-industry collaboration.

Read More

Real-time, deception-based approach protects against ransomware

Imperva, Inc. has released Imperva SecureSphere File Firewall v12 with real-time deception technology designed to detect ransomware and to prevent it from encrypting enterprise data. The Imperva deception technology adds decoy files to network file shares, luring hackers to strike there first so they can be neutralized before encrypting critical data.

Read More

Bridging the 'Gap of Grief'

RSA, a Dell Technologies business, has unveiled RSA Business-Driven Security architecture, a new approach to help customers manage cyber risk and protect what matters most.

Read More

Study reveals that UK office workers have little trust in digital world.
A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber...
Worldwide IT spending is projected to total $3.9 trillion in 2021, an increase of 6.2% from 2020,...
New, free educational resources now available to help business and individuals block new...
International study shows no improvement in corporate defences despite soaring cyber losses.
F5 Labs releases new analysis of Security Incident Response Team data.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more