Logo

Beyond cost, IT infrastructure rationalization and cloud are hurdles for retailers

Improving customer experience could bring more sales, a better reputation and a higher market share.

Read More

LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein. Auf seiner Website berichtet das Unternehmen, dass es einige unautorisierte Zugriffe auf seine Systeme und internen Firmendaten aufgespürt hat

Read More

7 Elements expands team after period of high growth

IT security testing consultants, 7 Elements, has announced the expansion of its UK wide team with the appointment of three key roles, and with the imminent recruitment of an additional two team members. The business has enjoyed growth in the last twelve months and requires an expansion of the team to meet the increasing need from the financial services and oil and gas industries.

Read More

Malware creation breaks all records

Trojans were responsible for four out of five infections worldwide.

Read More

More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More

Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Postquantum cryptography and machine learning research initiatives currently underway in...
Global benchmarking study gives visibility into the security infrastructures of more than 400...
AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...
BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic...
AlienVault RSA survey finds that one third of respondents describe the state of security...
US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance,...