Logo

Cybersecurity Threat Landscape - 2016 predictions

  • Published in

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? For the first time as a newly combined company, Raytheon|Websense cybersecurity experts has shared security predictions for the coming year. Researchers suggest to be on the lookout for:U.S. presidential election cyber-antics; cybercriminals pickpocketing the wallet on your phone; and an increase in vulnerabilities from the aging Internet, among other...

Read More

NEWS

Security concerns will drive SMEs to cloud in 2016

  • Published in

Cloud adoption will continue to rise next year as concerns over security remain.

Read More

Enhanced security is top IT investment driver

  • Published in

Businesses focused on ensuring data is kept secure and resilient as they gear up for growth.

Read More

Security is security is security

  • Published in

Some security predictions for next year from Chris Pace, head of product marketing, Wallix.

Read More

Cyber security is low priority for UK

  • Published in

Despite eight out of ten IT decision makers experiencing a data or cyber security breach in their organisation in 2015, less than one-third plan to invest in cyber security technologies in 2016.

Read More

Businesses must tackle cyber security in 2016

  • Published in

The Cyber Streetwise Forum says that proactivity in tackling cyber crime must be a key business strategy for the year ahead.

Read More

IT team spending too long looking for, and addressing, threats.
Good knowledge doesn’t guarantee the right actions.
Ping Identity®, The Identity Security Company™, has announced PingOne for Groups. Built...
Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...
Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more