Helping organisations identify financial risks

RSA Archer Cyber Risk Quantification arms CISOs with the data they need to make informed decisions about their security initiatives.

Read More

Malware trends and predictions

Abuse of legitimate software, rapid exploitation of disclosed vulnerabilities and dynamic phishing techniques increase infection rates, according to the report.

Read More

Companies braced for breaches

More than a quarter of companies expect to be breached in next six months according to new global Balabit research report.

Read More

NEWS

IoT security spending to reach $1.5 billion in 2018

Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 per cent of organisations observed at least one IoT-based attack in the past three years. To protect against those threats Gartner, Inc. forecasts that worldwide spending on IoT security will reach $1.5 billion in 2018, a 28 per cent increase from 2017 spending of $1.2 billion.

Read More

Palo Alto Networks adds to endpoint protection

Palo Alto Networks has introduced advancements to its Traps™ advanced endpoint protection offering.

Read More

AlgoSec launches AlgoBot

AlgoBot answers users’ questions and assists with security policy tasks via an intuitive self-service interface that saves time and improves responsiveness and service.

Read More

164% increase in stolen, lost or compromised records.
Paired with enhanced SD-WAN management and zero-trust capabilities, new appliances streamline...
Seamless integrations protect privileged users faster, prevent data breaches.
Wick Hill and Zycko will now be known as ‘Wick Hill, a Nuvias group company’ and ‘Zycko, a...
A total of 84 million new malware samples were record in 2015, an increase of 9 million...
The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more