Firms missing out with do-it-yourself approach to Threat Intelligence

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More

BLOG

Top IT security threats in 2016

Netwrix sums up top seven security trends that will drive IT strategy and investment in 2016.

Read More

Top five biggest security predictions for the technology industry in 2016

Malware, Advanced Persistent Threats, and Linux ransomware are all set to plague businesses and consumers next year.

Read More

A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet 59 percent say threat detection metrics are most critical.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Kaseya’s seventh benchmark survey finds cybersecurity and data protection continue to present the...
Almost half (48%) of incidents occurred as a result of introduction of viruses/malware from third...
Cybercriminals learning how to monetize millions of incidents, yet report finds 95 percent could...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Elastic has launched what it says is the industry’s first free and open Limitless Extended...
Third annual report details how financial CISOs are battling ransomware, wire fraud transfer,...