Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Mobility benefits put at risk by companies' inattention to work-life balance and security issues

The proliferation of mobile devices is driving an array of positive changes in workplace culture and how we work. But these always-on mini-computers are also upending our sense of “work-life” balance, fanning executive anxieties about security and privacy, and forcing IT departments to overhaul their information-security approaches, according to The personalisation challenge: business culture and mobile security, an Economist Intelligence Unit report, sponsored by HP Networking.

Read More

Grace Shacklady, technical author Of PAS 555, joins IT Governance

IT Governance Ltd, the fast-growing cyber security services business, has announced that Grace Shacklady, technical author of PAS 555 - Cyber Security Risk – Governance and Management, has joined the company as a senior consultant.

Read More



Malware, insecure networks, and remote access top list of concerns as organisations embracing home...
The new Check Point R81.10 software, Check Point Quantum Maestro 175 and Check Point Quantum...
Only two percent of “GDPR-ready” organisations are compliant.
Collaboration enables organizations to remediate critical vulnerabilities within minutes.
Half of first-time security analysts working in Security Operations Centres (SOCs) plan to leave...
Industry-first software-based solution delivers robust, low-latency network protection.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more