Traditional methods easy to evade

Damballa, the advanced threat discovery company, has released customer research data that indicates over 75% of active infections easily evade detection by traditional protection methods. As malware is evolving so quickly, the research indicates that some of the most frequently deployed security solutions cannot identify active infections that lead to costly breaches.

Read More

Mobility benefits put at risk by companies' inattention to work-life balance and security issues

The proliferation of mobile devices is driving an array of positive changes in workplace culture and how we work. But these always-on mini-computers are also upending our sense of “work-life” balance, fanning executive anxieties about security and privacy, and forcing IT departments to overhaul their information-security approaches, according to The personalisation challenge: business culture and mobile security, an Economist Intelligence Unit report, sponsored by HP Networking.

Read More

Grace Shacklady, technical author Of PAS 555, joins IT Governance

IT Governance Ltd, the fast-growing cyber security services business, has announced that Grace Shacklady, technical author of PAS 555 - Cyber Security Risk – Governance and Management, has joined the company as a senior consultant.

Read More



Sumo Logic’s Cloud SIEM Enterprise offering includes a rich set of capabilities to ease the...
Three quarters (73%) of UK small and medium-sized business leaders think their workforces lack the...
Outgunned security executives navigate complex obstacles to keep rising attacks from turning into...
Gambling organisations most targeted by ransomware attacks in EMEA.
Emulex Corporation has announced the Emulex Endace Fusion Connector for Splunk, an open workflow...
Fortinet has published the findings of its latest quarterly Global Threat Landscape Report. The...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more