Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat Protection solution. The expanded solution now incorporates threat intelligence from a variety of commercial and community best-of-breed threat intelligence offerings including Check Point Software, Cisco, CrowdStrike, Lastline, Palo Alto Networks and Soltra, the STIX TAXII communication platform.

Read More

Adapt celebrates Cyber Essentials PLUS certification

Adapt stands out from the crowd during Cyber Essentials assessment.

Read More

NEWS

A single data protection law for Europe - what does it mean?

EU Parliament has announced that wants single data protection law in place by end of 2015. This law, the General Data Protection Regulation (GDPR), is due to be passed through European Parliament. It will impact any organisation that gathers, processes and stores personal data. Here, Alesandro Porro, VP of International at Ipswitch outlines what difference the GDPR is likely to have on businesses and organisations in 2015. 

Read More

NEWS

Cybersecurity hub promises single standards database

The hub will be the first of its kind, enabling companies to quickly scope, define and maintain all major cybersecurity requirements and frameworks in one place.

Read More

NEWS

Capgemini Group launches Cybersecurity Global Service Line

New Group wide initiative will enable organisations to embrace digital transformation securely.

Read More

NEWS

One billion data records compromised during 2014

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with cybercriminals targeting identity theft as top breach category.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Multi-vendor solution combined with shared responsibility strengthens security, simplifies...
Report finds that removing admin rights from endpoints would mitigate 77% of all Critical Microsoft...
New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom...
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Aligning with one of Gartner’s key trends for 2021 - Cybersecurity Mesh, - “a distributed...
Study shows organisations are managing more than ten times the amount of data than they did five...