NEWS

One billion data records compromised during 2014

  • Published in

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with cybercriminals targeting identity theft as top breach category.

Read More

NEWS

Key risks for businesses using Cloud Computing in 2015

  • Published in

By the Forensic Risk Alliance (FRA).

Read More

NEWS

Arbor Networks partners with Zycko

  • Published in

Network security provider expands EMEA Distribution Channels.

Read More

Fortinet joins the VMware NSX Partner Ecosystem

  • Published in

Fortinet has joined the VMware NSX™ partner ecosystem and has also revealed its new FortiGate-VMX firewall appliance, which will enable greater security for customers within agile, elastic software-defined data centers based on VMware vSphere and VMware NSX virtualization platforms.

Read More

NEWS

Shadow IT continues to give cause for concern

  • Published in

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating the level of shadow IT in their cloud ecosystems. CipherCloud has unveiled the results of the industry’s first comprehensive study of cloud usage and risks from 2014, compiled from enterprise users in North America and Europe. 

Read More

Advanced threat analytics addition

  • Published in

BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that enables IT and security professionals to identify the data breach threats typically missed by other security analytics solutions. A standard capability of the BeyondInsight management, reporting and analytics console, Clarity pinpoints specific, high-risk users, accounts and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

Read More

The Institution of Engineering and Technology (IET) has launched a new guide, Code of Practice:...
Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec...
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Leading solutions provider for government information systems chooses Becrypt’s cyber...
Research reveals that 80 percent of comment spam traffic is generated by 28 percent of attackers.
By Stephen Gates, Chief Security Evangelist for Corero Network Security.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more