Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

Read More

Fortinet launches Cyber Threat Assessment Program

Analysis of enterprises piloting the program shows that social media and application control demand great vigilance, while banks are favorite targets.

Read More

Cross-Cloud visibility and data protection

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance controls and encryption across a wide range of applications through cloud APIs.

Read More

Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks.

Read More

Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications, products and cloud services with Gemalto's industry-leading authentication, encryption and key management solutions.

Read More

Harrowells Solicitors selects SMS PASSCODE to secure remote working

Harrowells Solicitors, the Yorkshire-based law firm, is working with Danish authentication company SMS PASSCODE, to secure its remote access to the company’s network and applications.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
BAFTA, EMMY, and GRAMMY award-nominated studio leverages Lacework for continuous compliance,...
Symphony Technology Group has launched Skyhigh Security. The new portfolio company was created to...
837 security tests carried out on 353 businesses found that firms are extremely susceptible to...
Criminal groups change strategies to maximise impact.
Focus on integrated, open security systems with cloud-first technology empowers organisations to...
Agreement provides customers with access to leading ‘Endpoint Protection and Response’...