BLOG

Out of the Frying Pan and into the Firewall

  • Published in

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More

NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

  • Published in

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

Rise in supply chain security breaches

  • Published in

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Incident response takes two working days

  • Published in

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

NEWS

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

  • Published in

CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth annual Fal.Con cybersecurity conference. These new offerings showcase the CrowdStrike Falcon® platform and CrowdStrike’s continued innovation in the security space and give Security, IT and DevOps teams the comprehensive tools needed to stop breaches and stay two steps ahead of today’s adversary.

Read More

NEWS

HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

  • Published in

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More

New Business Network Protect Complete bundle offers industry-leading internet access and security...
Report finds the average employee shares six passwords with coworkers, making password management...
Businesses and people around the world suffer ransomware attacks every day.
Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations...
Open Cybersecurity Alliance to connect the fragmented cybersecurity landscape with common, open...
Leaving data in an insecure location, failure to redact or bcc, and emailing the wrong person cited...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more