Simplifying security and policy management

Brocade has introduced Ruckus Cloudpath™ ES 5.0 software. The new release builds on previous BYOD onboarding capabilities to create a complete integrated security and policy management platform. Cloudpath ES 5.0 software enables IT organisations of any size to easily establish secure, policy-based access for wired and wireless devices.

Read More

Common enterprise IoT devices are hackable in under three minutes

In-depth analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks.

Read More

NEWS

Luxembourg to become a Cyber Security hub

More proactive use of more sophisticated anti hacking tools against among the latest Cyber Security trends.

Read More

NEWS

Enterprises lack visibility and control of IoT devices on their network

Traditional security tools fall short in securing a growing number of diverse IoT devices driving need to rethink IoT security strategy.

Read More

NEWS

Alibaba and Gemalto work hand-in-hand to secure China's IoT market

Gemalto is collaborating with Alibaba Group's YunOS to provide connectivity and security for YunOS - developed by Alibaba Group, it is a cloud-based, data and services oriented Internet of Things (IoT) operating system, widely integrated into IoT devices, as well as chips and sensors across industries. In this partnership, Gemalto provides its Allynis Trusted Service Hub that allows easy provisioning of security sensitive applications throughout the identity lifecycle management.

Read More

NEWS

One in four companies have no cyber security plans

One in four European companies would be significantly exposed in the event of a cyber-attack, according to data from DLA Piper, the global law firm.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
StealthWatch 6.4 features new levels of network visibility and security intelligence for improved...
Enterprises in Singapore and Malaysia will increase their ICT spendings in 2014, says new research...
Malware, ransomware attack volume down 6% and 9%, due to more targeted attacks.
Survey finds more than 90 percent of EMEA respondents plan to deploy hyperconvergence within next...
Forcepoint Cloud Security enhances process, people and technology readiness to combat ransomware...
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards,...