BLOG

How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are already within the network perimeter, often with privileged access to the company’s critical data, systems, and applications. They are a trusted part of the company ecosystem, and their actions are therefore typically more difficult to detect and contain. A malicious insider breach is also one of the most financially ruinous types of data breaches....

Read More

NEWS

Employees are not the weakest security link

Record-breaking 20 million active phishing Reporters and 100+ million phishing simulations inform extensive study.

Read More

NEWS

IoT attacks - more planning required

Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks, despite the fact that ninety percent worry about future threats.

Read More

NEWS

Security practice is the biggest challenge for IT teams

Lack of Artificial Intelligence skills and a smart, connected approach to quality assurance impedes business growth.

Read More

NEWS

Strengthening hybrid IT secure access at leading Italian publishing house

Advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure.

Read More

VIDEO

Barracuda Backup | Matson & Isom

Barracuda Backup protects data wherever it resides. User error, malicious deletion, cyber-attacks and natural disaster can threaten your business. This video featuring Matson and Isom and their client, Youth for Change, shows how picking the right backup technology can make all the difference when it comes to recovering after a wildfire.

Watch now

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of...
After strong progress in recent years, organisations must ensure they continue to invest in cyber...
Study also reveals security professionals overwhelmingly view insider threats as a dangerous...
Absolute’s self-healing endpoint and secure access portfolio delivers ‘hybrid work-in-a-box’...
Transaction combines data backup and recovery technology with cybersecurity platform to deliver...
Leader in integrated cloud security expands partner programme in response to an upsurge in demand...