BLOG

Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More

NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

Rise in supply chain security breaches

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Incident response takes two working days

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

NEWS

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth annual Fal.Con cybersecurity conference. These new offerings showcase the CrowdStrike Falcon® platform and CrowdStrike’s continued innovation in the security space and give Security, IT and DevOps teams the comprehensive tools needed to stop breaches and stay two steps ahead of today’s adversary.

Read More

NEWS

HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More

By Chris Stoneff, director of professional services at Lieberman Software Corporation.
Findings from new study of tenured cybersecurity professionals and those seeking their first...
Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part...
Research by ThycoticCentrify shows a majority of organizations experienced a ransomware attack,...
Shadow IT and a lack of business continuity planning present growing threats.
Gemalto has released the latest findings of the Breach Level Index, a global database of public...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more