Financial apps - secure or not?
  • Posted on 24th April 2018 in by Phil Alsop

Two thirds of online banks still have at least one critical vulnerability, even as the numbers decline.

Read More
NEWS
Global cybercriminal revenues hit $1.5 trillion
  • Posted on 23rd April 2018 in by Phil Alsop

Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality, exposing cybercriminal links to drug production, human trafficking and terrorism.

Read More
Thunder defeats cyber attacks
  • Posted on 20th April 2018 in by Phil Alsop

A10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder TPS (Threat Protection System) with A10’s Non-stop DNS solution across multiple data centres to ensure resilience from escalating cyber-attacks and scale its mission critical DNS services.

Read More
Security orchestration across major Cloud platforms
  • Posted on 19th April 2018 in by Phil Alsop

As they struggle to deal with the speed of business process automation and the exponential growth of corporate data, 66 per cent of enterprises and 49 per cent of SMBs are planning to expand their hybrid cloud infrastructures. At the same time, every second company feels it cannot fully...

Read More
Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused...

Read More
A10 Networks introduces One-DDoS Protection

A10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...

Read More
Legacy email systems - a significant security risk?

Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...

Read More
Tripwire expands Cloud Security capabilities

New functionality tackles publicly exposed cloud data; core secure configuration functionality now...

Read More
Helping to validate Microsoft Azure DDoS Protection Service defences

BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only...

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More

Videos

Omer Wilson, Chief Marketing Officer of the Start Campus, explains why Start Campus and EDP have signed a strategic partnership marking their shared intention to accelerate next-generation, renewable-powered...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Dan Wensley, CEO of the Global Technology Industry Association (GTIA), discusses how MSPs must collaborate as AI adoption accelerates across the industry. He explains why community, peer learning, and open...

Expert Opinions

By Sadiq Syed, SVP, Digital Buildings at Schneider Electric.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Peter Manta, AI Strategy and Practice Director, Informatica by Salesforce.
By Philippe Omer Decugis, General Manager EMEA & SVP Sales, BlackLine.