Logo
NEWS
COVID-19 spam, phishing emails, plagued users in first half of 2020
  • Published in

F-Secure’s attack landscape update highlights attackers’ strategies to capitalize on the COVID-19 pandemic and other developments with online threats.

Read More
NEWS
DDoS attacks increase by 151% in first half of 2020
  • Published in

Latest research from Neustar reveals rise in intensity, sophistication and volume of DDoS attacks amid seismic changes driven by COVID-19 pandemic.

Read More
NEWS
Highly effective CISOs in short supply?
  • Published in

Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner CISO Effectiveness Index, according to a survey by Gartner, Inc.

Read More
NEWS
Beware outbound email data breaches
  • Published in

Research by Egress reveals organisations suffer outbound email data breaches approximately every 12 working hours.

Read More
NEWS
Cyber deception reduces data breach costs

Attivo Networks has published the results of a new research report conducted with Kevin Fiscus of...

Read More
NEWS
Red tape restricts industrial cybersecurity initiatives

The recent Kaspersky report ‘State of Industrial Cybersecurity in the Era of Digitalisation’...

Read More
NEWS
Insider threat partnership

Joint solution integrates detection, automated investigations and incident response capabilities to...

Read More
NEWS
Dramatic rise in e-crime activity

Falcon OverWatch 2020 Mid-year report provides insights into massive uptick in intrusion activity...

Read More
NEWS
Phishing - the most vulnerable sectors and departments

Cyber attacks cause great harm to the business world due to their evolving nature and it is...

Read More
NEWS
Internal security failures pose biggest cyber risk to businesses

837 security tests carried out on 353 businesses found that firms are extremely susceptible to...

Read More
NEWS
ThreatConnect acquires cyber risk quantification pioneer Nehemiah Security

Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the...

Read More
NEWS
People-centric DLP

Proofpoint has introduced multiple new Proofpoint innovations to ensure that organizations...

Read More
NEWS
Once more unto the breach

Nine out of ten IT professionals have experienced a data breach – with four out of five concerned...

Read More
NEWS
IT admins feel under equipped when it comes to remote working security

Shadow IT and a lack of business continuity planning present growing threats.

Read More
NEWS
People-centric protection

The combined solutions allow organisations to contain and remediate attacks against privileged...

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...

Expert Opinions

By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge
By Chris Ackerson, SVP of Product at AlphaSense.
By Manvinder Singh, VP of Product Management for AI at Redis.
By Haris Pylarinos, Founder and CEO of Hack The Box