End users demand DDoS protection from ISPs

  • Published in

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.

Read More

Playing it safe in the Cloud

  • Published in

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell, CTO, Swivel Secure, writes.

Read More

ExtraHop and macmon secure form technology alliance

  • Published in

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More

Trustwave and Palo Alto Networks forge Managed Security Services pact

  • Published in

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation managed security services to global, multi-national businesses and government agencies.

Read More

Protecting your business against a DDoS attack  

  • Published in

By Wieland Alge, VP and GM, EMEA at Barracuda Networks.

Read More

Don’t let information ignorance turn your data dream into a nightmare  

  • Published in

By Cindy Truyens, Managing Director at SQS.

Read More

CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials...
The Secure Identity Alliance has announced that the German Federal Ministry of the Interior...
While 82 percent of respondents believe the IT security industry is making progress against cyber...
By Ted Julian, Co-founder and CMO, Co3 Systems.
Centrify’s identity management solutions enable global liqueur and spirits leader to give its...
CyberArk says that DevOps and security professionals have worrying knowledge gaps about where...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more