End users demand DDoS protection from ISPs

  • Published in

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.

Read More

Playing it safe in the Cloud

  • Published in

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell, CTO, Swivel Secure, writes.

Read More

ExtraHop and macmon secure form technology alliance

  • Published in

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More

Trustwave and Palo Alto Networks forge Managed Security Services pact

  • Published in

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation managed security services to global, multi-national businesses and government agencies.

Read More

Protecting your business against a DDoS attack  

  • Published in

By Wieland Alge, VP and GM, EMEA at Barracuda Networks.

Read More

Don’t let information ignorance turn your data dream into a nightmare  

  • Published in

By Cindy Truyens, Managing Director at SQS.

Read More

LogPoint positioned to accelerate growth with advanced analytics and machine learning driving the...
Kaspersky Lab and SYSGO have showcased a security solution for safety-critical tasks which embeds...
Traditionally a technique of the most talented hackers, automated SQL attack tools are putting...
Research released by IT analyst firm Quocirca, in conjunction with Digital Guardian, has revealed a...
OpenDNS’s security search engine makes threat intelligence both interactive and actionable...
Along with broad-based use of encryption and biometric technologies, expect increased focus on...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more