IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

NEWS

Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Barracuda enhances Web Application Security portfolio

Barracuda has introduced the new Barracuda Vulnerability Manager, a cloud-based service to help customers detect vulnerabilities in their websites and applications running in on-premises, cloud, and hybrid environments.

Read More

NEWS

70% of world population will be mobile users

Since 2000, when the first camera phone was introduced, the number of mobile users has quintupled. By 2020, there will be 5.5 billion mobile users, representing 70 percent of the global population, according to the Cisco Visual Networking Index™ (VNI) Global Mobile Data Traffic Forecast (2015 to 2020).

Read More

The rise of the digital ransomware business

AppRiver’s Global Security Report shows business is booming for online extortionists.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks,...
Converged infrastructure trend provides technical and business efficiencies for customers and...
Whatever their size, interest, geography and industry – all businesses will benefit from...
Tenable has released the Measuring and Managing the Cyber Risks to Business Operations Report, an...
Leaving data in an insecure location, failure to redact or bcc, and emailing the wrong person cited...
ExtraHop hash issued a report detailing rapid substantial changes in device usage trends as...