Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security.

Read More

NEWS

Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers are actively working to exploit people instead of software flaws to steal money and information for financial gain, espionage, and to establish footholds for future attacks.

Read More

WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a new, unified approach to encryption and key management, SecureDoc 8.2 will enable industry-leading data security across endpoints, data centres, hyper-converged infrastructures and into the cloud – and view it all from a Single Pane of Glass.

Read More

Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour, system security, performance and operations, and simplify IT infrastructure.

Read More

AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user.

Read More

Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises accelerate and bolster their security capabilities as they move toward a more agile and mature security model, so they can contend with a rapidly evolving security threat landscape.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Delivers enterprise-scale network metadata to data lakes without the complexity, constant tuning...
69% of IT professionals are not confident their data would be secure if perimeter defenses were...
Software veteran appointed to support EMEA growth.
Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly,...
DenyAll is executing on its growth strategy by acquiring BeeWare, another European security leader....
Lookout has launched its new global channel partner program. Developed based on partner feedback,...