TechData teams with iPass

Tech Data has form a pan-European agreement with iPass Inc. (Nasdaq: IPAS), a leading provider of global mobile connectivity, to distribute its intelligent connection management and Wi-Fi service offerings.

Read More

Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other devices. Exabeam Entity Analytics discovers the normal behaviour of medical, industrial, networking, home and mobile devices, and uses that baseline to alert security teams when unusual events occur.

Read More

NEWS

DigiCert selected to provide Root CA for AeroMACS

DigiCert has been selected to host the Root CA for Aeronautical Mobile Airport Communication System (AeroMACS), the only wireless technology that has been validated by major international regulatory bodies to support the safety and regularity of flight.

Read More


Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More

NEWS

Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More

Nearly three quarters (71%) of CIOs find new computing devices that they didn’t previously know...
Small to medium sized organisations (SMEs) in the UK are optimistic about business prospects in...
83% of respondents believe their organization is at risk, while 64% anticipate the problem...
CompTIA announces government funding for Cyber Ready retraining initiative, giving applicants a...
Mehr als je zuvor sind Unternehmen heute von Software abhängig und verlassen sich auf...
IT infrastructure provider Softcat has secured a bid for all 11 Lots within the new Technology...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more