Research predicts a major increase in cybersecurity costs 

  • Published in

Juniper Networks, in partnership with the RAND Corporation, a nonprofit institution that helps improve policy and decision-making through research and analysis, has unveiled insights into the economic challenges, trade-offs and demands facing companies as they protect themselves against increasingly complex security threats.

Read More

DDoS attacks resemble Advanced Persistent Threats in sophistication

  • Published in

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against organizations during the period from March 1 through May 7, 2015.

Read More

Disagreement over security objectives

  • Published in

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT security and IT leaders and their staff. The participants were based in 42 countries in the following regions: North America, Europe, Middle East, Africa, Asia Pacific, Japan and Latin America. The...

Read More

Cisco embeds security everywhere

  • Published in

Cisco has introduced new offerings to embed security throughout the extended network – from the data center out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control. By integrating security everywhere, enterprises and service providers gain the ability to deliver the threat-centric security requirements demanded by today's dynamic threat landscape and capture emerging business opportunities created by the rise of the Digital Economy and the...

Read More

Confidence and confusion surround network security

  • Published in

While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network.

Read More

Sophos adds email security

  • Published in

Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.

Read More

Cyberespionage hits manufacturing, public sector and education hard: 21 percent of cases analyzed.
New research highlights limitations of leading Mobile Device Management solutions: Airwatch...
Centrify encourages businesses to increase their Identity and Access Management maturity to...
Local authority expands use of SIEM technology internally to ensure compliance with all...
92% of UK enterprises have a digital transformation strategy, but current IAM solutions are...
Bad information management practices leave fledgling business over exposed to risk.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more