85% of enterprises keeping sensitive data in the Cloud

Sensitive Information in big data environments rises to 50%, IoT 33%.

Read More

Check Point research shows rise in DDoS-related malware

Conficker remains the most active malware family, but malware linked to denial-of-service attacks increased sharply during the month.

Read More

Insurance a critical component of cyber defence strategy

Cyber Essentials eases path to cyber insurance for UK’s SMEs.

Read More

AdaptiveMobile launches NPP 6

Delivering cloud architecture to protect all key services from IP to signalling, through to advanced messaging including RCS.

Read More

Ciber and WhiteHat Security partner

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and cost-effectively transform their business by modernising and securing their mission-critical applications.

Read More

Virtual monitoring capabilities for DDoS detection

Corero Network Security has introduced beta availability for the Corero SmartWall® Network Threat Defense - Virtual Edition  (vNTD Monitor).

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
The beauty brand implemented password management tools to promote online safety amongst employees.
Hitachi Vantara joins Cisco’s Solution Technology Integrator and Service Provider Partner...
Exabeam unveils AI-driven security workflows to support enterprise AI governance.
Gavin Millard, EMEA technical director, Tenable Network Security shares 2016 predictions.
Survey finds 78% of developers identify AI as a security risk, yet they continue to input sensitive...
Failing to do so could leave firms having wasted time, money and effort – and facing hefty fines.