64 percent of organisations name regulatory compliance, information security standards as the top reason for securing data in the cloud

As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud creates the need for insight into both cloud adoption trends and cloud data security issues. As a companion to the “Cloud Adoption & Risk Report in North America & Europe” report, CipherCloud unveils the inaugural edition of its “Global Cloud Data Security Report,” the industry’s first...

Read More


Lack of controls to manage privileged access

Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption.

Read More

DDoS attacks 'more frequent and sophisticated in nature'

Corero Network Security has released the findings of its inaugural Quarterly DDoS Trends and Analysis Report. Through the analysis of customer data from the fourth quarter of 2014, Corero found that attackers are evolving their use of DDoS attacks to circumvent companies’ cybersecurity solutions, disrupt service availability and infiltrate victim networks.

Read More

EPSRC and Innovate UK announce £5 million investment in UK cybersecurity research and innovation

Funding bodies’ support for Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast will help deliver a resilient and connected nation.

Read More

Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Sophos has published a multi-part research series on the realities of ransomware, including an...
Company debuts brand-new eCrime Index showing intensity of cyber-criminal market over time; reveals...
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in...
According to the first in a series of social media polls conducted by Infosecurity Europe 2019,...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more