NEWS

Attacks using IoT devices and Windows SMB escalate in 2019

F-Secure's global honeynet measured twelve times more attack events in H1 2019 than in H1 last year.

Read More

NEWS

Security breaches hit SMBs

Nearly one-third (32%) of IT group employees in SMBs and mid-market enterprises globally said their organisation had experienced a security breach in the past five years, with at least 10% of the total sample of respondents reporting that they were hit by a breach in the past year. That’s according to a new survey conducted by Kaseya which polled more than 400 global respondents.

Read More

NEWS

Cybersecurity - big in the boardroom

Two-thirds of enterprises are s.truggling to embed security in the enterprise-IT architecture

Read More

NEWS

10 methods to mitigate IoT security threats

​​Cyber Security Services, an emerging cyber security consulting company, has released its top 10 strategies for securing IoT (Internet of Things) devices.

Read More

NEWS

Advanced report reveals most businesses ignore security when investing in new technology

While only a third say regulatory change triggers purchase of new technology.

Read More

NEWS

High profile GDPR fines having greatest impact on UK cyber security spend

Latest judgements against British Airways and Marriott producing fear of fines (32%) and increasing board level involvement with cyber security within financial firms.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities...
According to the first in a series of social media polls conducted by Infosecurity Europe 2019,...
Trustwave and Osterman Research have released results of a new study on cybersecurity resource...
A new F-Secure report documents ransomware getting more fearsome, but there’s reason for optimism.
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Visuelle Darstellung von IT-Racks, 3D-Rechenzentren und integriertes Anwendungs-Monitoring bieten...