Logo
NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

NEWS

Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Thycotic names Simon Azzopardi Vice President of EMEA

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, has appointed Simon Azzopardi to Vice President of EMEA. In this role, Azzopardi will be responsible for building a world-class two-tier channel focused on delivering an unparalleled level of service to Thycotic customers. Azzopardi will also be tasked with expanding Thycotics’s presence in the EMEA region and facilitating the growth of the company into new,...

Read More

NEWS

Skyhigh Networks and Check Point partner

Seamlessly extending security, compliance, and governance to cloud use.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Lieberman Software Corporation and Balabit have implemented their  joint solution at the...
Auth0 acquires Apility.io to integrate IP reputation in Anomaly Detection capabilities; and...
Cybersecurity leader recommends greater focus on data security as ICO data breach fines rise...
41% of IT leaders say content sprawl is increasing the risk of data breaches and leaks.
Company invests in UK, Nordics and Benelux as it moves to trusted advisor and solutions player in...
80 million fraud attacks and 210m bot attacks originated from Europe in Q1 2018.