NEWS

Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber credentials to win contracts.

Read More

NEWS

Legacy data systems present a red flag for GDPR compliance

Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer data, whilst over half said that assuring the location of test data would be a tough challenge.

Read More

Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on staying safe online.

Read More

MapR and Talend collaborate

Combined offering accelerates GDPR compliance by addressing key requirements around data inventory, portability, anonymization, and more.

Read More

Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of attackers.

Read More

NEWS

McAfee report reveals secrets of successful threat hunters and SOCs

Effectiveness comes with complementary investments in human-machine teaming.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
The EU is to impose new data protection legislation to ensure better protection of the personal...
Less than one fifth feel prepared, 60% still need to make changes and 5% are not prepared at all.
The technology that supports and protects an organization’s information is increasingly...
Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and...
According to a new CyberArk survey, half of organisations (50 percent) did not fully inform...
Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.