Beyond cost, IT infrastructure rationalization and cloud are hurdles for retailers

Improving customer experience could bring more sales, a better reputation and a higher market share.

Read More

LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

  • Published in

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein. Auf seiner Website berichtet das Unternehmen, dass es einige unautorisierte Zugriffe auf seine Systeme und internen Firmendaten aufgespürt hat

Read More

7 Elements expands team after period of high growth

  • Published in

IT security testing consultants, 7 Elements, has announced the expansion of its UK wide team with the appointment of three key roles, and with the imminent recruitment of an additional two team members. The business has enjoyed growth in the last twelve months and requires an expansion of the team to meet the increasing need from the financial services and oil and gas industries.

Read More

Malware creation breaks all records

  • Published in

Trojans were responsible for four out of five infections worldwide.

Read More

More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

  • Published in

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More

Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

  • Published in

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More

Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.
ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...
Juniper Networks has released its Adaptive Threat Profiling feature for Juniper® Advanced Threat...
The Secure Identity Alliance has announced that the German Federal Ministry of the Interior...
Report indicates that consumers are likely to avoid conducting business with an organization that...
Employing multi-factor authentication (MFA) when accessing important or sensitive web-based...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more