VIDEO

Are You Cyber Risk Ready? Understanding the RSA Risk Frameworks Web Assessment

Is your organization equipped to manage cybersecurity risk? Watch to learn more about the RSA Risk Frameworks web assessment tool, a first step in understanding your organization's cyber incident maturity.

Watch now

BLOG

How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years ago, the job title was, more typically, data processing manager or head of data processing, and the job itself tended not to be recognised as a driver of added value. By Ken Mortensen, Data Protection Officer, Global Trust & Privacy, InterSystems.

Read More

BLOG

Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise that the adoption of IT security solutions in corporate businesses is on the rise, with 1.9 billion personal and sensitive data records compromised between January 2017 and March 2018. By Adrian...

Read More

NEWS

Financial sector overconfident when it comes to security

Seventy-one percent believe machine identities are central to company security and viability, but few identities are tracked .

Read More

NEWS

PolySwarm to launch first crowdsourced malware detection ecosystem

PolySwarm’s open source, decentralised threat intelligence ecosystem rewards security experts and enterprises for accurately detecting threats.

Read More

NEWS

Beware the phishing season

F5 Labs and Webroot release 2018 Phishing and Fraud Report; Fraud incidents between October and January jump over 50% compared to the annual average.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Business leaders must strike a balance between flexibility and security to address risky behaviours...
Check Point® Software Technologies has launched Check Point Quantum Spark 1900 and 2000, the...
BATM has received a substantial government cyber security order, with a value of $26m. The order is...
Cyware and Cyber Fusion Distribution have joined forces to reshape the SOAR and Threat Intel...
Check Point Software’s MSSP Program redefines security collaboration with simplified, scalable,...
Almost half of all respondents activated an improved cybersecurity strategy in 2022.