Cybersecurity certification program

  • Published in

SecureAuth Corporation has launched the SecureAuth University, a continuing education program for customers, partners and employees of SecureAuth. Through eLearning and instructor-led courses, SecureAuth University offers certification for three levels of cybersecurity professionals: administrator, advanced administrator and developer.

Read More

White paper focuses on cyber security issues affecting data centre remote monitoring

Digital remote monitoring services deliver real-time monitoring and data analytics support via the cloud to data centre operators. The obvious benefits of maximum uptime with minimal overhead and improved efficiency are nevertheless offset by the threat of such systems being used as an avenue for a cyber attack. With proper precautions taken at both the design and operations stages, these threats can be minimised.

Read More

Only 8% of Asian nations are safe for data privacy

  • Published in

Only four Asian nations are considered truly secure for data storage, according to a new report by secure data centre Artmotion. Combining independent data from the United Nations, World Economic Forum, Transparency International and several other leading privacy groups, the report titled Data Danger Zones ranks over 170 nations on their abilities to keep digital information safe, private and secure.

Read More

Now available: ThreatConnect powered by SAP HANA

  • Published in

ThreatConnect + SAP HANA: intelligence-driven defense supercharged with in-memory computing.

Read More

NEWS

Data theft rising sharply

  • Published in

Three out of every four organisations have been hit by the loss or theft of important data over the past two years, a sharp increase since 2014, according to a new survey of more than 3,000 employees and IT practitioners across the U.S. and Europe. The report was conducted by the Ponemon Institute and sponsored by Varonis Systems.

Read More

DevOps ignoring security code quality

  • Published in

Research highlights the incongruous approach of code development and the business with regard to security.

Read More

Research reveals that 80 percent of comment spam traffic is generated by 28 percent of attackers.
With SafeNet Encryption and Key Management solutions customers can securely share data in the...
Due to the current pandemic, and the ensuing remote work, many organisations have now had to change...
Check Point Research (CPR) report a 45% increase in cyber-attacks on healthcare organizations...
McAfee, the device-to-cloud cybersecurity company, has introduced partner program innovations,...
Recorded Future has revealed its plans for a new approach to building an intelligence-led...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more