Cyber attacks becoming automated and 'industrialised'

  • Published in

Imperva has unveiled the findings of its sixth annual Web Application Attack Report (WAAR). This year’s report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive data.

Read More

Exposing haphazard privileged account management practices

  • Published in

76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach.

Read More

A10 Networks expands portfolio of security solutions

  • Published in

Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture.

Read More

Research examines real-world networks’ exposure to credential theft attacks

  • Published in

Research provides insights into cyber attacks that abuse hijacked privileged credentials to compromise enterprise security.

Read More

Twistlock strengthens container security

  • Published in

Twistlock has announced the general availability of the Twistlock Container Security Suite and a strategic partnership with Sonatype.

Read More

Quarter of UK businesses wide open to email security breach

  • Published in

25 per cent of businesses currently have no email security solution in place.

Read More

Survey reveals UK office workers do not understand basic security threats and organisations are...
LogRhythm has launched version 7.7 of the LogRhythm NextGen SIEM Platform. The update introduces...
Dtex Systems targets growing insider threat solutions market in EMEA.
New CASB technology integration bridges network and cloud security.
Chemring Technology Solutions has launched ForensicAI, an advanced system of artificial...
Emulex Corporation says that IRESS, a global provider of comprehensive financial securities and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more