Insecurity in existing endpoint protection deployments

  • Published in

Survey of 300 information security practitioners highlights challenges securing end users.

Read More

Advanced services and threat analysis capabilities for WideAngle Managed Security Services

  • Published in

MSS platform provides improved detection rates for unknown threats of up to 500%.

Read More

BalaBit secures $8m for business-friendly IT security

  • Published in

BalaBit has raised a $8 million Series A round of funding to speed up the development and expansion of its pioneering IT security platforms. The new investment will be used to fuel BalaBit’s international expansion in North America and additional European markets including the UK and Scandinavia. The cash was raised from London based C5 Capital, Europe’s first dedicated investor in the security and data sector.

Read More

Fujitsu tasks Tom Roche with spearheading its products division

New division head tasked with accelerating growth for security business.

Read More

Growing number of successful attacks

  • Published in

33% said a malware attack cost on average between £10,000 and £50,000 to remediate, highlighting need for greater threat intelligence when securing IT networks. Check Point has announced the findings of a survey showing that a combination of progressively more sophisticated malware and lack of intelligence about new security threats are key reasons for the growing number of successful malware attacks.

Read More

Quiss Technology first IT services provider in UK to gain ISO 27001:2013

  • Published in

Following months of hard work and an intensive audit, leading IT services provider Quiss Technology has achieved ISO 27001:2013 accreditation, the internationally acclaimed standard for information security management accredited by UKAS.

Read More

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating...
Leveraging User Behavior Analytics (UBA) to make dynamic risk assessments in real-time is the most...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...
Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...
Long-exploited advanced threat vectors in virtualised environments defeated by security experts.
Shadow IT and a lack of business continuity planning present growing threats.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more