NEWS
Attacks focus on people as well as their technology
  • Posted on 6th June 2017 in by Phil Alsop

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More
Trojan Horse warning
  • Posted on 5th June 2017 in by Phil Alsop

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt and distract network operators from more destructive security threats.

Read More
Kaspersky launches Security Cloud
  • Posted on 5th June 2017 in by Phil Alsop

Every person is unique and, just like their fingerprints, everyone’s digital life is different too. That’s why every Internet user needs a security solution that adapts to their online behavior – this was the rationale behind the release of Kaspersky Security Cloud. The new service...

Read More
Patches far from perfect
  • Posted on 2nd June 2017 in by Phil Alsop

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from today’s polymorphic threats, says Bromium.

Read More
Vectra collaborates with VMware

Delivering visibility into hidden cyber attacker behaviours throughout virtualised environments.

Read More
Deloitte and LogRhythm join forces to provide advanced cyber security solutions

Deloitte to offer LogRhythm’s Threat Lifecycle Management technology to help customers rapidly...

Read More
Number of fines for UK data privacy issues doubles and totals ?3.2m

The UK was one of the most active regions for regulatory enforcement action in Europe last year,...

Read More
NEWS
Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals...

Read More
East Sussex Healthcare NHS Trust upgrades secure access to reduce costs and complexity

Multi-vendor solution delivers self-service tools and simplified two factor authentication while...

Read More
BeyondTrust supports Microsoft Azure

PowerBroker Privileged Access Management and Retina Vulnerability Management solutions now...

Read More
NEWS
Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments,...

Read More
SonicWall appoints Michael Berg to lead Channel Program in Europe

Michael Berg has joined SonicWall as Senior Director of Channel Sales with a focus on Europe. As...

Read More
Linux protection

Kaspersky Lab has unveiled a major update to its dedicated security product for data centres,...

Read More
NEWS
DDoS opportunity

Corero Network Security has published the results of the second-annual study of service...

Read More
IBM Security launches new capabilities

IBM has introduced new incident response capabilities, from its IBM Resilient security portfolio,...

Read More

Videos

Rob Coupland, CEO at Pulsant, discusses the company’s £10 million investment in its Milton Keynes data centre to provide high-density, sovereign compute capacity to support AI transformation, with plans to...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...

Expert Opinions

By Simone Larsson, Head of Enterprise AI, EMEA, Lenovo.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Leon Ward, Chief Transformation Officer, Securonix.
By Graham Jarvis, Freelance Business and Technology Journalist