Clarifying two-factor authentication

By Toyin Adelakun, a VP at Sestus.

Read More

iomart Group plc selects Arbor Networks’ Peakflow® SP Platform

iomart Group plc, one of Europe’s leading providers of complex managed and cloud hosting services, has selected the Arbor Peakflow® SP platform in order to protect its infrastructure from distributed denial of service attacks that are the primary threat to the availability of their services.

Read More

Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways.

Read More

Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd. to power the cloud-based identity and access management (IAM) features of the Samsung KNOX EMM (Enterprise Mobility Management) cloud-based service.

Read More

Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme designed to enhance the cyber security of many of our everyday technologies and tools by ensuring that the software that underpins them is more trustworthy.

Read More

King’s College Hospital uses Netwrix Auditor to secure ICT network

Netwrix helps London hospital to improve security of 10,000-plus user network and provide full visibility of who is making changes, when and where.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
The Verizon Data Breach Investigations Report (DBIR) series opened the doors to the world of...
Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
Egnyte has released its Cybersecurity Trends for Mid-Sized Organisations Report, a mid-year update...
Research from Netacea reveals businesses don’t understand up to half of the traffic on their...
Industry-first offering will leverage generative artificial intelligence and reinforcement learning...
Leading technology distributor strengthens cloud security and DevSecOps offering with new vendor...