Encryption enhances container security

Thales Container Security allows users to meet compliance, regulatory, best practices requirements.

Read More

NEWS

Security, collaboration and development trends driving enterprise app adoption

Cloud video conferencing solution Zoom is the fastest growing app in EMEA within Okta’s network.

Read More

VR and immersive technology the keys to cybersecurity recruitment?

New research shows millennials & post-millennials more likely to embrace a cybersecurity career with rich Interfaces and VR/AR technologies.

Read More

Managed security services mask skills shortage

Lack of internal skills and access to better technology driving UK businesses to partner with managed security services providers – NTT Security 2017 Risk:Value report.

Read More

Infoblox partners with McAfee for unified security

Infoblox is partnering with McAfee to improve the security of a customer’s network by combining the power of web and Domain Name System (DNS) security to deliver unified security. The Infoblox and McAfee solution enables sharing of threat intelligence and security event information to deliver comprehensive protection and faster incident response.

Read More

Companies invest in security solutions but not staff

Just 4% of IT departments have staff dedicated to analysing IT security logs and only 6% have staff dedicated to acting on security reports.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
2016 predictions from Skyhigh Networks CEO.
According to new research conducted by the Department for Business, Innovation & Skills (BIS)...
Outpost24, an innovator in full stack cybersecurity assessment, has acquired Blueliv, a leading...
90% of IT professionals are concerned about employees using their personal credentials for work...
The proliferation of different devices, networks, platforms and applications to support the...
Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...