NEWS

Cyber threats to increase in 2020?

FireEye has released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs and other senior executives across North America, Europe, and Asia to uncover attitudes towards some of cybersecurity’s most prevalent topics.

Read More


NEWS

IoT attacks - more planning required

Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks, despite the fact that ninety percent worry about future threats.

Read More


NEWS

Rapidly evolving world of cyber threats and defence explained

Atos highlights significant new threats and innovative cyber security solutions that have recently gathered momentum in its new paper Digital Vision for Cyber Security 2.

Read More

BLOG

How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control systems and damaged nuclear power plants. Five years later, the BlackEnergy malware attack on the Ukrainian power supply became the first cyberattack that caused a blackout. By Anthony Perridge, VP...

Read More

New McAfee vision enables organizations to secure people, devices and data in the cloud.
Global research survey discovers that 65% of respondents experience buyers’ remorse after closing...
Despite 80% of organisations running up to 10 different protection and cybersecurity solutions...
Ordr has released its annual report on the state of connected devices, titled “Rise of the...
Versa Networks has published the book SASE For Dummies.
Global research reveals the disconnect between business decision makers and security teams, even as...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more