NEWS

Global cybersecurity report reveals misaligned incentives

  • Published in

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More

Hackers only need 24 hours

  • Published in

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.

Read More

NEWS

Predicting people - the future of security

  • Published in

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More

40 per cent of accounts are hacked by simply guessing user passwords

  • Published in

Kaspersky Lab launches new password manager to help secure passwords.

Read More

Tenable expands partner Ecosystem

  • Published in

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More

NEWS

IT departments find it hard to keep the Cloud safe

  • Published in

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More

Two recent incidents show that attacks involving the Internet of Things are becoming a reality....
The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that...
Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify...
Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the...
LogRhythm’s NextGen SIEM Platform provides rapid detection, response and neutralization of...
Continual high-profile internal security breaches prompt a surge in preventative measures against...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more