Logo

UK backed framework for threat intelligence released

  • Published in

MWR InfoSecurity reviews the threat intelligence landscape to produce CPNI and CERT-UK supported guidance for organisations.

Read More

64 percent of organisations name regulatory compliance, information security standards as the top reason for securing data in the cloud

  • Published in

As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud creates the need for insight into both cloud adoption trends and cloud data security issues. As a companion to the “Cloud Adoption & Risk Report in North America & Europe” report, CipherCloud unveils the inaugural edition of its “Global Cloud Data Security Report,” the industry’s first...

Read More

Keys and certificates under attack

  • Published in

Attacks and financial impact grow as more organisations are unprepared.

Read More

Lack of controls to manage privileged access

  • Published in

Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption.

Read More

DDoS attacks 'more frequent and sophisticated in nature'

  • Published in

Corero Network Security has released the findings of its inaugural Quarterly DDoS Trends and Analysis Report. Through the analysis of customer data from the fourth quarter of 2014, Corero found that attackers are evolving their use of DDoS attacks to circumvent companies’ cybersecurity solutions, disrupt service availability and infiltrate victim networks.

Read More

The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase...
A10 customers can satisfy security and regulatory requirements by decrypting SSL traffic while...
FireHost has announced trends for the attacks it blocked from its clients’ web applications...
Palo Alto Networks® and VMware, Inc. have extended the companies’ strategic partnership...
Leading pan-European energy trading house meets tight budgetary and regulatory constraints through...
NTT Com Security has been named as both UK Partner of the Year and EMEA Reseller of the Year by...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more