Spanning, an EMC company, has published the results of a survey of US and UK IT professionals, comparing the two regions in terms of SaaS adoption, data protection and compliance. Key among the findings, accidental deletion of information was the leading cause of data loss from SaaS applications (43 percent US; 41 percent UK), ahead of data loss caused by malicious insiders and hackers.
Read MoreWhat is the most damaging consequence of DDoS attacks to businesses? Losing the trust and confidence of your customers, according to nearly half of IT security professionals participating in Corero Network Security’s second annual DDoS Impact Survey.
Read MoreVaronis Systems has revealed the results of a year of anonymous data collected during risk assessments conducted for potential customers on a limited subset of their file systems. The 2015 results show a staggering level of exposure in corporate file systems, including an average of 9.9 million files per assessment that were accessible by every employee in the company.
Read More60% of security professionals say spend on information security is not keeping pace with growing risk according to IISP survey.
Read MoreCylance, the company that is using artificial intelligence to proactively prevent advanced persistent threats and malware, today announced that it is expanding into the EMEA region with the establishment of a London-based team led by Evan Davidson, former enterprise sales director at FireEye. The company has also established a channel partnership with CoreSec Systems, a market leader in delivering cybersecurity and networking solutions in Sweden and Denmark.
Read MoreZscaler will power Deutsche Telekom’s newest security solution, Internet Protect Pro, a new offering from its Magenta Security Portfolio, for its business customers. The completely cloud based Internet Protect Pro encompasses the Zscaler cloud security platform and be operated in Deutsche Telekom’s highly secure data center in Biere, Germany ensuring compliance with European data residency and privacy requirements.
Read More