NEWS

Distology to distribute LogRhythm cybersecurity solutions

The exclusive distribution deal expands Distology’s solutions portfolio and enables more VARs to capture new revenue from real-time cybersecurity solutions.

Read More

NEWS

Thycotic and Centrify merge

Combined company to deliver comprehensive cloud privileged access management solutions to meet unique demands of the market, from SMB to global enterprises.

Read More

NEWS

CISOs face constant dilemmas to avoid drowning in their ‘security debt’

Outgunned security executives navigate complex obstacles to keep rising attacks from turning into more breaches.

Read More

NEWS

Enterprises prioritise customer data protection, but continue to leave it exposed

Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations have achieved consistent encryption strategies, and other key trends in encryption and cybersecurity.

Read More

NEWS

Bot traffic climbs to record high

40.8% of internet traffic in 2020 was not human.

Read More

NEWS

Westcon-Comstor to offer intelligence-driven cybersecurity solutions through Anomali

Strategic European distribution agreement will provide customers with world-class cybersecurity protection.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
NTT Com Security AG is expanding its commitment in Switzerland with the full acquisition of...
Not all world records are cause for celebration—just look at the DDoS attack numbers from 2020....
FireMon helps customers increase security, decrease complexity and reduce security expenditure by...
CompTIA announces government funding for Cyber Ready retraining initiative, giving applicants a...
Unique intelligence on latest mobile threats, including how SS7 network breaches are compromising...
IT departments must free themselves from the pressures of tactical necessities before they can be...