Software AG expands data protection for enterprises

Partners with DPG to add unique data protection IP and analysis to the digital business platform.

Read More

NEWS

Computer scientists address gap in messaging privacy

Researchers have developed a solution to a longstanding problem in the field of end-to-end encryption, a technique that ensures that only sender and recipient can read a message.

Read More

Blockchain platform to deliver 'first-ever' turnkey digital ID system

New blockchain platform to put consumers in control of their online identities.

Read More

Gigamon extends its Public Cloud Visibility Platform to include Microsoft Azure

Recognised leader extends pervasive visibility to multi-cloud environments.

Read More

NEWS

Organisations worried technical skills gap will leave them exposed to security vulnerabilities

New Tripwire study reveals 91 percent of organizations will look to outsource security to tackle skills gap.

Read More

Research shows staff training key to protecting UK business from cyber-attack

55 percent of UK workers can’t recall receiving cybersecurity training, despite cyber-attacks affecting over half of UK business in 2016.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
The majority of executives (87%) around the world cite untrained staff as the greatest cyber risk...
2020 Zero Trust Progress Report lists at-risk devices among top secure access challenges –...
Vectra research finds most cyberattacks against the energy and utilities industry transpire and...
New release brings cloud-native attacks and vulnerabilities to the forefront of the SOC, gives...
Nuix has published a provocative white paper by cybersecurity veteran Chris Pogue arguing that the...
79% of CIOs are concerned that users might ignore IT policies and guidelines, increasing security...