NEWS

One billion data records compromised during 2014

  • Published in

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with cybercriminals targeting identity theft as top breach category.

Read More

NEWS

Key risks for businesses using Cloud Computing in 2015

  • Published in

By the Forensic Risk Alliance (FRA).

Read More

NEWS

Arbor Networks partners with Zycko

  • Published in

Network security provider expands EMEA Distribution Channels.

Read More

Fortinet joins the VMware NSX Partner Ecosystem

  • Published in

Fortinet has joined the VMware NSX™ partner ecosystem and has also revealed its new FortiGate-VMX firewall appliance, which will enable greater security for customers within agile, elastic software-defined data centers based on VMware vSphere and VMware NSX virtualization platforms.

Read More

NEWS

Shadow IT continues to give cause for concern

  • Published in

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating the level of shadow IT in their cloud ecosystems. CipherCloud has unveiled the results of the industry’s first comprehensive study of cloud usage and risks from 2014, compiled from enterprise users in North America and Europe. 

Read More

Advanced threat analytics addition

  • Published in

BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that enables IT and security professionals to identify the data breach threats typically missed by other security analytics solutions. A standard capability of the BeyondInsight management, reporting and analytics console, Clarity pinpoints specific, high-risk users, accounts and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

Read More

LEADING business continuity and information security adviser Jermyn Consulting has signalled clear...
Attacks will broaden and differentiate to penetrate new vulnerable surfaces.
Total data market will nearly double in size through 2019.
CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials...
Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the...
Local authority expands use of SIEM technology internally to ensure compliance with all...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more