Clarifying two-factor authentication

By Toyin Adelakun, a VP at Sestus.

Read More

iomart Group plc selects Arbor Networks’ Peakflow® SP Platform

iomart Group plc, one of Europe’s leading providers of complex managed and cloud hosting services, has selected the Arbor Peakflow® SP platform in order to protect its infrastructure from distributed denial of service attacks that are the primary threat to the availability of their services.

Read More

Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways.

Read More

Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd. to power the cloud-based identity and access management (IAM) features of the Samsung KNOX EMM (Enterprise Mobility Management) cloud-based service.

Read More

Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme designed to enhance the cyber security of many of our everyday technologies and tools by ensuring that the software that underpins them is more trustworthy.

Read More

‘X-Ray’ vision into firewall configurations and network traffic

Newest enhancement to WatchGuard Dimension visibility solution allows admins to see policy misconfigurations and optimise traffic.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Micro Focus has published the 2020 State of Security Operations report, which reveals that security...
As evidenced by the onslaught of ransomware attacks and data breaches making the news almost daily...
2014 was a year in which information security vaulted into the public eye, driven by a surge in...
Despite eight out of ten IT decision makers experiencing a data or cyber security breach in...
Respondents cite cloud vulnerabilities, IoT attacks, and data manipulation as most worrisome future...
Juniper delivers on the benefits of a Threat-Aware Network by securing more traffic, in more areas...