NEWS

Role of the threat hunter 'often unclear'

ThreatQuotient has published the results of the SANS Threat Hunting 2019 study. The most important result is the worldwide confusion about the role and tasks of a threat hunter. The study, sponsored by ThreatQuotient and conducted by SANS, is based on data collected from 575 participating companies that either work with or operate their own threat hunting teams.

Read More


NEWS

A quantum security risk?

Almost a quarter of security leaders are experimenting with quantum computing strategies, as more than half worry it will outpace existing technologies.

Read More

NEWS

Cloud security for containers

McAfee has introduced McAfee MVISION Cloud for Containers, thereby becoming the first unified cloud security platform to integrate container security with its Cloud Access Security Broker (CASB) and Cloud Security Posture Management (CSPM) security solution. Leveraging NanoSec’s zero trust application visibility and control capabilities for container-based deployments in cloud environments, the solution provides customers with the ability to speed up application delivery while enhancing the...

Read More

NEWS

BitDam defends dairy

BitDam adds an important layer of protection for Scotland’s largest independent dairy.

Read More

Cybersecurity threat list for 2017 from Fujitsu Security Operations Center highlights critical...
McAfee Unified Security Powered by Allot delivers comprehensive, yet simple, service that...
Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...
Reid to leverage 20 years of in-depth security expertise to help organisations worldwide more...
Verisign observed that 52 percent of DDoS attacks that were mitigated in Q2 2018 employed multiple...
Integration of Dell’s identity governance and privileged management solutions provides a...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more