Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Mobility benefits put at risk by companies' inattention to work-life balance and security issues

The proliferation of mobile devices is driving an array of positive changes in workplace culture and how we work. But these always-on mini-computers are also upending our sense of “work-life” balance, fanning executive anxieties about security and privacy, and forcing IT departments to overhaul their information-security approaches, according to The personalisation challenge: business culture and mobile security, an Economist Intelligence Unit report, sponsored by HP Networking.

Read More

Grace Shacklady, technical author Of PAS 555, joins IT Governance

IT Governance Ltd, the fast-growing cyber security services business, has announced that Grace Shacklady, technical author of PAS 555 - Cyber Security Risk – Governance and Management, has joined the company as a senior consultant.

Read More



DomainTools has released its 2017 Cybersecurity Report Card global research. Developed in...
Dell Software has introduced new mobility solutions designed to help customers better support...
Rapid7 has released its first threat intelligence report, an analysis of threats faced by...
Mit den neuen Releases „Cubeware Cockpit V6pro 4.2“ und „Cubeware Mobile BI...
McAfee, part of Intel Security, has outlined its strategy for helping businesses and government...
The BooleBox secure enterprise collaboration platform is now used by the European External Action...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more