DDoS attacks damage customer confidence and revenues

  • Published in

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, according to new research from Corero Network Security.

Read More

Bromium will enhance Windows 10’s Advanced Security with micro-virtualization

Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10, delivering the World’s Most Secure Endpoint to help eliminate enterprise breaches.

Read More

NTT Com Security and Fortinet form global security partnership

  • Published in

NTT Com Security and Fortine have entered into a formal partnership to provide expert security advice and world-class security solutions to organizations worldwide. The partnership includes incorporating the broad range of Fortinet security solutions into NTT Com Security solutions to help protect customers across the globe, irrespective of size or sector.

Read More

Organisations spend half a million pounds, annually, dealing with false positive alerts

  • Published in

A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff responding to malware alerts is wasted because of faulty intelligence. The report found that teams spend, on average, 272 hours each week responding to ‘false positive’ cyber alerts – due to erroneous or inaccurate malware alerts. This equates to an average cost of £515,964 annually, for each organisation, in lost time.

Read More

Check Point teams with VMware

  • Published in

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention for all data centre traffic.

Read More

Palo Alto Networks, Cisco and Dell are top vendors for intrusion detection and prevention

  • Published in

AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise Mobility Management market.

Read More

Company delivers new product capabilities to boost enterprise worker productivity via secure...
Auth0 acquires Apility.io to integrate IP reputation in Anomaly Detection capabilities; and...
Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.
NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...
Map highlights all attacks detected by Check Point gateways globally, showing the country of...
Bromium has revealed the results of its “State of Security Report Card,” a survey of...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more