How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from cloud visibility and enablement company, Skyhigh Networks, suggests that only 1 in 100 cloud providers meets these requirements to date.

Read More


Grant Thornton has announced the creation of a global technology industry group. The group will...
Cyber experts and research teams warn of risks to critical infrastructure and national...
Online resource behind benchmark survey promises to help companies measure the effectiveness of...
Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR)...
STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for...
Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more