Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More



Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Tripwire has published the results of an extensive Tripwire study conducted by Dimensional...
Channel programme includes sales programmes with margin protection for registered partners and...
McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new...
Uptick in global demand for Lacework drives 3X in revenue growth, 5X increase in new customers as...
Proofpoint has introduced its Proofpoint Domain Discover solution to proactively stop lookalike...
OpenDNS’s security search engine makes threat intelligence both interactive and actionable...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more