NEWS

EMEA IT security professionals are suffering under the pressure of email attacks

Every day, there are countless headlines in the world’s media documenting the damage of cyber attacks. It’s almost always the financial and reputational damage inflicted upon organisations that’s focused upon, rather than the human cost of these attacks.

Read More

NEWS

Data breach costs on the rise

IBM Security has published the results of its annual study examining the financial impact of data breaches on organizations.

Read More

NEWS

Only half of organisations believe they can stop cyber attacks

According to a new global survey from CyberArk, 50 percent of organizations believe attackers can infiltrate their networks each time they try. As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process automation (RPA) and in the cloud – is compounding risk.

Read More

NEWS

Malware breach detection goes from months to minutes

New AI-based breach mitigation automatically detects and remediates zero day threats and evasive malware.

Read More


NEWS

Thycotic launches High-Velocity Vault

Thycotic has expanded its PAM-as-a-service solution to address the velocity and scale requirements of DevOps organizations.

Read More

Softcat has reached the top level of the Check Point Software Technologies’ partner hierarchy...
2015 predictions come from Bob Plumridge, EMEA CTO at HDS, and also chairman of SNIA Europe.
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
CLOUDNEETI, an ISV unit of Avyan Corp, has launched two assessments – (1) Cloud Workload...
Tufin has introduced Tufin Orchestration Suite R19-1, advancing its leadership in network security...
Whatever their size, interest, geography and industry – all businesses will benefit from...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more