AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to support more organizations in staying ahead of emerging attacks. As part of the effort, HP intends to integrate data from AlienVault Open Threat Exchange (OTX) into HP Threat Central, its cloud-based threat intelligence sharing and analysis platform. 

Read More


FortyCloud available IBM’s Cloud Marketplace

FortyCloud for IBM provides an extensive security solution to assist IBM Cloud customers meet security best practices and compliance regulations.

Read More

Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote monitoring and management (RMM) solutions to increase visibility and scale to meet the ongoing demands of managing cloud-based solutions, according to a new Autotask survey of MSPs.

Read More

Imperva teams with IS Group

Agreement strengthens IS Groups’ cloud service offering by providing its over 30,000 customers with industry-leading security and performance solutions.

Read More

Huntsman Security breathes new life into legacy SIEM deployments with Unified Console

Defence-grade solution brings improved visualisation, more advanced analytics and simplified data management to multi-vendor, multi-domain security environments.

Read More

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services....
Informatica has released research highlighting that UK businesses are unable to determine the risk...
New research from T-Systems into cyber security behaviour and awareness has found that Generation...
Cloud access security broker Adallom and OPSWAT, a provider of software-based solutions to secure...
Approximately 5.4 million DDoS attacks represent an 11% increase over 1H2020.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more