Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More

Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber security solutions.

Read More

Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash spending on ICT are proving harder to deliver on than previously expected.

Read More

Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More

SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Frightening lack of awareness of the European Commission’s draft bill that unifies and...
Company’s CEO unveils comprehensive mobile security offerings at Mobile World Congress.
2016 predictions from Skyhigh Networks CEO.
Becomes just the second company ever to receive Binding Corporate Rules (BCR) approval through...
Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...
IT departments must free themselves from the pressures of tactical necessities before they can be...