NEWS

Almost 10 percent of IT assets are vulnerable to exploitation

eSentire has released its Q1 2019 Quarterly Threat Report which reveals that 8% of externally-facing IT assets are susceptible of being exploited by a high or critical severity vulnerability as classified by the Common Vulnerability Scoring System (CVSS) v3.0 used by the National Vulnerability Database (NVD).

Read More

NEWS

Plans for zero trust projects

UK large enterprises use the most security tools although 1 in 5 in the DACH region plan to increase security spending by over 25%.

Read More

NEWS

Vectra raises $100 million

Financing to drive further global expansion in the $12.7 billion cloud security market.

Read More

NEWS

Critical shift in security responsibilities

As C-level executives engage more frequently in incident response and threat hunting, more IT professionals are missing security events and alerts due to poor legacy app integrations.

Read More

NEWS

Imperva to acquire Distil Networks

Imperva will integrate the Distil Networks’ solution into the Imperva security stack to deliver complete protection for applications and APIs, wherever they reside.

Read More

NEWS

BeyondTrust publishes 2019 Privileged Access Threat Report

BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and improved integration are vital to tackling the modern threat landscape.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Exabeam and SecureAuth + Core Security have formed a collaborative relationship to secure...
Cryptzone has launched the newest version of AppGate, which enables organizations to easily...
BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...
Inefficient incident response to email attacks is costing businesses billions in losses every year....
Defenders fight back against weaponization of new technologies, industrialisation of e-crime, and...
Thales Container Security allows users to meet compliance, regulatory, best practices requirements.