NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

NEWS

Exabeam introduces Cloud-based SIEM

Deployment flexibility and transferable user-based pricing model allows security teams to easily migrate to the cloud.

Read More

NEWS

Vectra launches Cognito Stream

Delivers enterprise-scale network metadata to data lakes without the complexity, constant tuning and scale limitation of open-source Zeek.

Read More

NEWS

Cybercriminals earning over $3B annually exploiting social platforms

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining has seen social media-enabled cybercrimes grow by more than 300-fold.

Read More

NEWS

Attack on critical national infrastructure is imminent

Convergence between physical and cyber environments is leaving businesses exposed.

Read More

NEWS

Three-quarters of cybersecurity professionals still concerned about bot traffic

Seventy-five percent of organisations have expressed concerns about bot traffic (bot robots and scrapers) stealing company information, despite the same number already deploying a bot traffic manager solution, according to new research from the Neustar International Security Council (NISC).

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...
A third of UK businesses have suffered a data breach because of remote working in the last 12...
Allows on-demand API access to turnkey cyberthreat expertise.
Online resource behind benchmark survey promises to help companies measure the effectiveness of...
New online courses for all Nessus and SecurityCenter users give customers, partners and consultants...
Access to new training and technical sales tools enhance partners’ privileged account...