Logo
NEWS
Cynomi's State of the Virtual CISO Report 2024 reveals service provider opportunities
  • Published in

Offering vCISO service provided substantial financial gains for service providers, with the majority increasing revenue according to the report.

Read More
NEWS
Data breach costs surge in industrial sector
  • Published in

Although security teams worldwide are doing a much better job detecting and containing breaches, the average data breach cost snowballs. In 2024, the average cost of a data breach skyrocketed to $4.88 million, up from $4.45 million in 2023, showing a 10% spike and the highest increase since the...

Read More
NEWS
e2e-assure partners with Searchlight Cyber
  • Published in

Managed Threat Detection & Response provider, e2e-assure, has partnered with Searchlight Cyber, the dark web intelligence company. This collaboration will ensure the integration of dark web intelligence into the proactive monitoring of e2e-assure’s new and existing customers.

Read More
NEWS
Logpoint and Advitum enter partnership to help organisations advance cyber defences
  • Published in

Logpoint and The Swedish Managed Service Provider Advitum have entered a strategic partnership to help Swedish organisations defend against cyberattacks.

Read More
NEWS
Siegwerk strengthens global manufacturing operations

GTT enhances operational security and digitalisation for global manufacturer Siegwerk with Managed...

Read More
NEWS
Streamlining OT threat and vulnerability workflows

Dragos has introduced the latest release of the Dragos Platform, said to be the industry’s most...

Read More
NEWS
Nozomi Networks collaborates with Mandiant

With the general availability of the Nozomi TI Expansion Pack, critical infrastructure...

Read More
NEWS
Security AI and automation lowers data breach cost

According to data presented by AltIndex.com, companies that used security AI and automation...

Read More
NEWS
Report reveals signs of evening out in ransomware productivity

As ransomware actors continue to adapt, the new report underscores the importance of vigilance,...

Read More
NEWS
Check Point Software to acquire Cyberint

Check Point Software Technologies signs a definitive agreement to acquire Cyberint Technologies...

Read More
NEWS
Ransomware surge in 2024 demands coordinated global response

Amid intensifying geopolitical tensions, ransomware attacks in 2024 are set to reach record levels,...

Read More
NEWS
Gartner 2024 Hype Cycle for Emerging Technologies highlights developer productivity, total experience, AI and security

The 25 disruptive technologies to watch on the Gartner, Inc. Hype Cycle for Emerging Technologies,...

Read More
NEWS
44% of foiled ransomware attacks are caught during lateral movement

Barracuda’s ransomware review of 2023/24 also shows that healthcare remains the top attack target.

Read More
NEWS
Holiday period sees significant increase in ransomware activity across July

In July 2024, global levels of ransomware attacks increased month-on-month (331 to 395) but...

Read More
NEWS
Node4 forms strategic partnership with Elastio

Node4 has announced a strategic partnership with cybersecurity company Elastio. This collaboration...

Read More

Videos

Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

Andrew Winters, executive vice president- managed detection and response from Obrela discusses the telecoms industry’s distinctive cyber threat profile