Logo

Cyber attacks becoming automated and 'industrialised'

  • Published in

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More

Exposing haphazard privileged account management practices

  • Published in

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More

A10 Networks expands portfolio of security solutions

  • Published in

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Research examines real-world networks’ exposure to credential theft attacks

  • Published in

Research provides insights into cyber attacks that abuse hijacked privileged credentials to compromise enterprise security.

Read More

Twistlock strengthens container security

  • Published in

Twistlock has announced the general availability of the Twistlock Container Security Suite and a strategic partnership with Sonatype.

Read More

Quarter of UK businesses wide open to email security breach

  • Published in

25 per cent of businesses currently have no email security solution in place.

Read More

MVISION EDR enables DXC to offer global MDR service.
Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade...
Complexity expected to grow in 2015 as IT budgets rise while IT departments feel a hiring squeeze.
Proofpoint has introduced several people-centric innovations across its three flagship platforms:...
Corero Network Security has been named a finalist for Security Product of the Year in the...
New report from Fidelis Cybersecurity identifies that organisations want to threat hunt, but...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more