Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security intelligence to end users.

Read More

C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More

Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More

Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 per cent were “secure breaches,” or breaches where strong encryption, key management, or authentication...

Read More

Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the ‘insider threat’.

Read More

Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more devices become connected and intelligent.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Security operations teams face challenges in understanding how their security tools work leading to...
Continues 2014 momentum to establish security intelligence firm as a market leader in the region.
Nuix, a technology company that enables people to make fact-based decisions from unstructured data,...
New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks...
Attacks will broaden and differentiate to penetrate new vulnerable surfaces.
New study scorecards IT performance against business and customer-value building metrics;...