Logo

Cybersecurity platform LogPoint secures $10 million in funding

  • Published in

LogPoint positioned to accelerate growth with advanced analytics and machine learning driving the next generation of SIEM.

Read More

Strengthening adaptive authentication

  • Published in

Leveraging User Behavior Analytics (UBA) to make dynamic risk assessments in real-time is the most effective way of strengthening security without sacrificing usability.

Read More

NEWS

Confusion over Cloud security

  • Published in

AlienVault RSA survey finds that one third of respondents describe the state of security monitoring within their organization as “complex and chaotic”.

Read More

NEWS

Industrial computers under attack

  • Published in

On average two-in-five computers, related to the technological infrastructure of industrial enterprises, faced cyberattacks in the second half of 2016. This is a finding from Kaspersky Lab’s report “Threat Landscape for Industrial Automation Systems. The second half of 2016.” The percentage of industrial computers under attack grew from over 17 per cent in July 2016 to more than 24 per cent in December 2016, with the top three sources of infection being the Internet,...

Read More

NEWS

Gemalto releases findings of 2016 Breach Level Index

  • Published in

Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases across industries.

Read More

Fujitsu introduces ‘Identity as a Service’

  • Published in

New Identity as a Service offering manages digital IDs in real time to ensure that only authorised and verified users can access critical corporate systems – across cloud services and on-premise systems.

Read More

Blue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...
International study of 3,000 businesses shows widespread variations in cyber security readiness.
Organisations are increasing their defences but it still isn’t enough to protect against...
FireEye, Inc. has announced the release of a report titled, “World War C: Understanding...
The Cybersecurity Resource Allocation and Efficacy (CRAE) Index reports that spending continued to...
Study from nine-months of penetration tests by Rapid7 analyses the most effective methods hackers...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more