Cisco report highlights weak links in increasingly dynamic threat landscape

  • Published in

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption...

Read More

Validation update

  • Published in

Login VSI, Inc. announces Login VSI 4.1, a substantial update to its flagship product. Login VSI is the industry-standard performance validation solution for centralized virtualized desktop and server-based environments. The new release, which has been tested in limited private beta since May 2014, benefits two main audiences: Enterprises and vendors. Enterprises use Login VSI to optimize the performance of their virtualized environments. Vendors of virtualization technologies and solutions...

Read More

IT security market grows

  • Published in

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK market for IT security services and products is estimated to have grown by 8% year-on-year in 2013.

Read More

PCI Compliance contributes to false sense of security

  • Published in

Tripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted by Dimensional and Atomik Research and sponsored by Tripwire. The survey evaluated the attitudes of 407 retail and financial services organizations in the U.S. and the U.K. on a variety of cybersecurity topics.

Read More

Alert Logic announces security solutions for Google Cloud Platform

  • Published in

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More

Integrated endpoint threat prevention, detection and response

  • Published in

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to make advanced threats easier to see and faster to stop.

Read More

Survey also reveals challenges with remote workers and business continuity in 2021.
As Internet-connected devices increase in popularity at home and work, consumers express mixed...
The study on ransomware, conducted by cybersecurity experts at Hornetsecurity, also found that...
With 2017 being yet another rollercoaster year for cyber security, experts at Fareham-based...
Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper...
Risk-based authentication hinders threat actors while streamlining user experience.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more