Logo

Securing cloud access for mobile users

Integrated offering gives IT full visibility and control over mobile devices, apps, and activities.

Read More

NEWS

Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were breached.

Read More

NEWS

Global Cyber Alliance sets out plan to tackle top cyber threats

The Global Cyber Alliance (GCA), a non-profit organisation aimed at tackling the cyber threat set up by the New York County District Attorney, City of London Police and the Center for Internet Security, has identified the top four risks to the online world.

Read More

Index aids security benchmarking

Online resource behind benchmark survey promises to help companies measure the effectiveness of cybersecurity and share best practices.

Read More

Only 17 per cent of businesses invest in cyber-security training for staff

The Open University says businesses need to understand the importance of building cyber-security skills as well as IT infrastructures.

Read More

NEWS

Two thirds of large UK businesses hit by cyber breach or attack in past year

Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
With data breaches and security vulnerabilities increasing year after year.  Matt...
Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...
Barracuda Web Application Firewall provides security for deployment of applications on the AWS...
(ISC)²® (“ISC-squared”), the world’s largest not-for-profit information...
New blockchain platform to put consumers in control of their online identities.
Every machine needs a unique identity in order to authenticate itself and communicate securely with...