BLOG

How Cognitive Bias Leads to Reasoning Errors in Cybersecurity

Forcepoint’s Dr Margaret Cunningham shares insight on how human bias can impact decision making and business outcomes, offering unique guidance on overcoming bias through human understanding combined with advanced behavioural analytics.

Read More

NEWS

ANSecurity strengthens New College Oxford’s network security with move to a Zero Trust model

ANSecurity delivers 6 week project to refresh college network infrastructure, improve security and reduce licensing and maintenance costs.

Read More

NEWS

EMEA identified as global hotspot for brute force access attacks

Research from F5 Labs shows region has highest proportion of brute force attacks.

Read More

NEWS

Cybersecurity - big in the boardroom

Two-thirds of enterprises are s.truggling to embed security in the enterprise-IT architecture

Read More

NEWS

Proofpoint expands Okta partnership

Cybersecurity leader and enterprise identity leader bolster the security posture for organizations’ very attacked people (VAPsÔ) by applying additional adaptive security controls.

Read More

VIDEO

Cisco Endpoint Security Analytics built on Splunk

An endpoint analytics product built just for Splunk users!

Watch now

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Strengthens its foothold with Critical National Infrastructures and large companies across Europe.
  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...
Thycotic has expanded its PAM-as-a-service solution to address the velocity and scale requirements...
Intended victim experienced no downtime despite attacker's persistence.
Survey results released by Lieberman Software, to coincide with European Cyber Security month,...
Black Friday is a chaotic time for both consumers and retailers. Customers scramble over one...