New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256 million synapses.

Read More

IT budgets set to increase according to a third (37%) of financial services organisations

Survey of UK & Ireland financial services sector reveals companies are set to spend as cost-cutting moves down the agenda and customers become priority.

Read More

Integration of Symantec’s Certificate Intelligence Center (CIC) with A10 Thunder ADCs

Provides customers with on-demand status of critical security data to help keep on top of their evolving security posture.

Read More

Skyscape secures Cyber Essentials Plus Scheme

Skyscape Cloud Services Limited has successfully achieved certification for the Government’s new Cyber Essentials Plus Scheme. Launched in early June 2014, the Cyber Essentials Scheme is designed to improve the resilience of UK businesses to common cyber security threats, and provides for verifiable certification of their capabilities.

Read More

South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace ICT as a major tool for business improvement.

Read More

Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance standards required to protect brand, intellectual property, and revenue.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Fourth annual report provides insights and trends drawn from analysis of more than 560 incidents.
By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...
Research conducted for the launch of UserLock 8 has found that fewer than a third of desk-based...
Focus remains on safeguarding connected devices and establishing a security baseline for protection...
Traditionally a technique of the most talented hackers, automated SQL attack tools are putting...
New study: IT decision makers reveal why they feel forced to keep obsolete systems running just to...