BLOG

2015 has been another eventful year for cyber security

Based on its current work with customers, Blue Coat has outlined what the cyber security world can expect to see in 2016.

Read More

NEWS

Cyber Security in 2016 – Will it really be any different to 2015?

asks Karl Sigler, Threat Intelligence Manager, Trustwave.

Read More

BLOG

Key trends taking place over 2016

Cybersecurity expert Gerard Bauer, VP EMEA at Vectra Networks, offers some thoughts on key issues for the coming year.

Read More

BeyondTrust and SailPoint join forces

BeyondTrust is collaborating with SailPoint as an inaugural member of its Identity+ Alliance. Designed to accelerate and enhance integration with operational and security infrastructures, SailPoint has opened its Identity Governance and Administration platform, IdentityIQ™, to select technology partners, including BeyondTrust.

Read More

NEWS

Lookers takes security up a gear with Hexis Cyber Solutions

Leading automotive retailer and distributor adopts next generation endpoint security solution to protect and secure sensitive business information.

Read More

From spear phishing to IoT and malvertising, security threats to plan for in the coming year

WatchGuard® Technologies has revealed its full list of 10 new information security predictions for 2016.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Enables organisations to compare their risk posture against industry peers.
Qumulo has announced integration with the Varonis Data Security Platform and introduced their new...
Research uncovers critical cybersecurity and compliance risks.
More than 75% of organizations are paying ransomware as mid-sized companies become the preferred...
Hierarchical ML-based threat analytics at source optimises threat detection and matures Zero Trust...
Thycotic has released the findings from its 2018 Black Hat conducted survey of more than 300...