Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile security incidents cost more than $100,000 for almost half of firms surveyed.

Read More

Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More


Application-layer DDoS detection

New capability enables organisations to obtain multi-faceted protection against distributed denial-of-service attacks.

Read More

Company’s virtual offerings, cloud services match with on-premises deployments to solve...
40.8% of internet traffic in 2020 was not human.
The second edition of #PASS2019 highlighted the importance of analysis and continuous learning to...
McAfee has introduced significant enhancements to its Secure Access Service Edge (SASE) solution...
New threat intelligence from F5 Labs shows that Europe suffers more attacks from within its borders...
Neustar-sponsored study reveals challenges and benefits of using threat feeds.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more