NEWS

Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified identity management across cloud, mobile and data centre, at Cloud Expo Europe last week in London.

Read More

NEWS

AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach.

Read More

NEWS

Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.

Read More



Enterprise Immune System technology to be integrated in BT’s security offerings

BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the global market.

Read More

Leading global channel services provider, Agilitas IT Solutions is expanding its offerings to...
China leading country source of attacks on manufacturing companies in UK and EMEA.
Company unveils IT Nation Secure, a cybersecurity education and training program, updates to...
72 percent believe advances in voice technology pose a significant threat to enterprise...
By Nicole Pauls is a Director of Product Management at SolarWinds.
Application innovation is at the heart of the digital economy. A new era of apps is redefining what...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more