Report illustrates value of intelligent security management

Industry-first study quantifies security management impact on security-related risks and operational costs.

Read More

What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of the biggest possibilities for the coming year.

Read More

Ixia enhances application and threat intelligence processor

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP),  which enables customers to rapidly extract security metadata, including Indicators of Compromise (IOC), and fast-track that information to reporting tools to speed Mean Time to Identify (MTTI) and Mean Time to Respond (MTTR) to security threats and malicious behavior.

Read More

Networks getting younger

The number of enterprises with at least one security vulnerability is the highest in five years.

Read More

Christian Buecker, CEO, macmon secure gmbh, says network access control (NAC) is needed now more...
Check Point has introduced Check Point Threat Extraction, a radical new security approach that...
According to IDC's Europe, Middle East, and Africa Quarterly Security Appliance Tracker, 2Q14...
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...
Allows companies to maintain ownership and control of encryption keys and enforce data protection...
But many still love their jobs, according to a new ‘IT happiness at work barometer’ .
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more