The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's ability to exploit vulnerabilities with methods such as DNS queries, exploit kits, amplification attacks, point-of-sale (POS) system compromise, malvertising, ransomware, infiltration of encryption...
Read MoreAccording to IT Security, a new Market Report from business intelligence provider Key Note, the UK market for IT security services and products is estimated to have grown by 8% year-on-year in 2013.
Read MoreTripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted by Dimensional and Atomik Research and sponsored by Tripwire. The survey evaluated the attitudes of 407 retail and financial services organizations in the U.S. and the U.K. on a variety of cybersecurity topics.
Read MoreAlert Logic first to deliver IDS and log management capabilities to Google cloud customers.
Read MoreBit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to make advanced threats easier to see and faster to stop.
Read More