New Atos paper outlines major advances in cyber security

Atos, a global leader in digital transformation, believes waiting for digital threats to materialise will soon be consigned to history as we enter a new age of predictive cyber security capability able to ward off cyber threats even before they occur.

Read More

Nuvias appointed as sole pan-EMEA distributor for Dtex Systems

Dtex Systems targets growing insider threat solutions market in EMEA.

Read More

4G and 5G networks are not ready for smart cities

Positive Technologies has issued an analytical report on fundamental security flaws in the 4G network core, known as Evolved Packet Core (EPC).

Read More

NEWS

Computer scientists address gap in messaging privacy

Researchers have developed a solution to a longstanding problem in the field of end-to-end encryption, a technique that ensures that only sender and recipient can read a message.

Read More

Blockchain platform to deliver 'first-ever' turnkey digital ID system

New blockchain platform to put consumers in control of their online identities.

Read More

NEWS

Organisations worried technical skills gap will leave them exposed to security vulnerabilities

New Tripwire study reveals 91 percent of organizations will look to outsource security to tackle skills gap.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Sophos has published a multi-part research series on the realities of ransomware, including an...
Cylance, the company that is using artificial intelligence to proactively prevent advanced...
The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to...
80 million fraud attacks and 210m bot attacks originated from Europe in Q1 2018.
Study reveals most organizations take additional precautions to secure IIoT.