Varonis helps U.S. Dept. of Homeland Security fend off data breaches

  • Published in

Varonis Systems has been added to the U.S. Department of Homeland Security’s and General Services Administration (GSA) Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring as a Service (CMaaS) Blanket Purchase Agreement (BPA). Varonis has been added to the BPA held by Technica Corporation, one of its solutions partners in the federal government space.

Read More

BeyondTrust enriches threat analytics with new firewall connectors

  • Published in

BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic view of risk with a new Clarity Threat Analytics connector for analyzing Palo Alto Networks firewall data, backed by the addition of real-time threat alerting capabilities.

Read More

Almost half of French enterprises plan to increase their ICT budget this year

A new survey from market researcher Kable shows that 46% of French enterprises are planning to increase their ICT budget this year, an increase of 18% from 2014. With the economy in France gradually warming up, French enterprises are investing in newer ICT domains to reap the benefits of technology in a rapidly changing digital marketplace. Kable’s survey shows that almost half (46%) of French enterprises are planning to increase their overall ICT budgets in 2015 – an increase of...

Read More

Two in five British adults affected by data breaches

  • Published in

Individuals are putting themselves at increased risk of identity theft by failing to follow the basics of online identity protection.

Read More

Call for more public-private cooperation over cybersecurity

  • Published in

Information technology (IT) executives within critical infrastructure organisations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with escalating cybersecurity threats, according to a survey released today by The Aspen Institute and Intel Security. A majority (76%) of survey respondents also indicated they believe a national defence force should respond when a cyber attack damages a critical infastructure company within national...

Read More

Six network security checks to mitigate the risk of data security breaches

  • Published in

By Luke Potter, Operations Manager, SureCloud.

Read More

Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10,...
New report looks at why these low-volume attacks are so costly, and how to protect your business...
asks Keith Graham, CTO for SecureAuth.
Organisations are increasing their defences but it still isn’t enough to protect against...
BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that...
BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more