Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual Infrastructure.

Read More

Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber security and e-discovery.

Read More

Anglo American selects HCL

Engagement includes South Africa, South America, Canada, Europe and Asia Pacific.

Read More

Varonis unveils DatAlert

Varonis Systems Inc. has announced the launch of the Varonis Data Governance Suite 5.9, which incorporates a variety of new features to better enable organisations to manage, protect and safely collaborate with unstructured data.

Read More

HP helps organizations meet government compliance requirements

HP Data Privacy Services protect confidential information, secure sensitive data and optimize IT management.

Read More

Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Research reveals that 80 percent of comment spam traffic is generated by 28 percent of attackers.
By Philip Lieberman, President & CEO Lieberman Software.
Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...
Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...
Defence plans should be made around an asset based approach.
A majority of IT organisations are kept in the dark when it comes to protecting corporate data in...