Logo
NEWS

Cyber-crime costs exceed $1 trillion

US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance, Bloomberg Intelligence says.

Read More

NEWS

Cloud-based threats cost $4.2 million

Respondents cite cloud vulnerabilities, IoT attacks, and data manipulation as most worrisome future threats.

Read More

NEWS

WALLIX embarks on new technology partnership

Adds behaviour analytics into its portfolio.

Read More

NEWS

Two-thirds of CISOs feel unprepared

62% of UK survey respondents consider human error their organisation's biggest cyber vulnerability as hybrid workforce presents new challenges for cybersecurity teams.

Read More

NEWS

Cybersecurity concerns drive digital transformation in UK public sector

Digital transformation pushed to the top of the priority list for central Government.

Read More

NEWS

Exabeam ‘reinvents’ security analytics

Innovative automated threat detection, investigation and response (TDIR) products illuminate industry’s first use case-driven, prescriptive and outcomes-based security solutions.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Businesses are increasingly scrutinising their data hosting choices due to trust and regulatory...
A Heimdal study reveals how the proliferation of security tools overwhelms and exhausts North...
Data privacy regulation a top three challenge for IoT adopters.
Venafi sponsored report by AIR Worldwide reveals large companies will see the highest proportion of...
Tufin Iris enables organisations to identify cloud security risks and achieve continuous compliance.
Risk-based authentication hinders threat actors while streamlining user experience.