Cisco launches Advanced Malware Protection capabilities and Incident Response services

Cisco has unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.

Read More

The risk from business partners

Enterprises average 1,555 partners, and 30% of data shared is with high risk partners.

Read More

NEWS

Lessons to be learned from Zero-day nightmares

By Philip Lieberman, President & CEO Lieberman Software.

Read More

DDoS attacks pose biggest threat yet to European businesses

Survey shows more than half of companies attacked have critical data stolen as a result of DDoS.

Read More

MITA security tender awarded to 6PM  

AlienVault USM selected to extend the security management of the Malta Information Technology Agency (MITA).

Read More

Cyber threats: backup and DR as important as cyber insurance

A recent report published by the British government and the insurance sector, aimed at addressing concerns surrounding cyber security, revealed that 98 per cent of large UK firms do not have an insurance policy in place which could help them recover from a serious cyber attack, despite 81 per cent suffering a breach in the past 12 months.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Company’s virtual offerings, cloud services match with on-premises deployments to solve...
Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...
The increasing number of connected devices is multiplying the probability of cyberattacks on...
VMware has released the results of its sixth Global Incident Response Threat Report, entitled:...
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...