Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are unaware of the risks

Read More

Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment time.

Read More

Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.

Read More

Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn, Facebook and Twitter.

Read More

Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT managers agree the rapid pace of technological change is making decisions about IT investment more difficult than 10 years ago. The study, which polled 250 IT decision makers across the UK, found that as a result of this rapid pace of change, 62 per cent of IT decision makers have invested in hardware or software that has never been used by the organisation.

Read More

SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Guidance Software has introduced the latest release of EnCase Forensic, v7.12. This version now...
Damballa has announced general availability of Damballa Failsafe 5.2 for enterprises, which...
15000 and 23000 Series appliances introduce full threat prevention to help keep enterprises one...
Over half of CIOs are apprehensive about business interruptions due to expired machine identities.
Seamlessly extending security, compliance, and governance to cloud use.
Expanded API access now enables developers at ISVs, OEMs, and service providers to build on the...