LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein. Auf seiner Website berichtet das Unternehmen, dass es einige unautorisierte Zugriffe auf seine Systeme und internen Firmendaten aufgespürt hat

Read More

7 Elements expands team after period of high growth

IT security testing consultants, 7 Elements, has announced the expansion of its UK wide team with the appointment of three key roles, and with the imminent recruitment of an additional two team members. The business has enjoyed growth in the last twelve months and requires an expansion of the team to meet the increasing need from the financial services and oil and gas industries.

Read More


More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More

Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More

More executives state responsibility for data security should reside outside of IT.
ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...
Avast research finds over half of SMB IT Decision Makers are more concerned about cyber security...
Majority of respondents now view identity management as path forward.
Unique new offer to detect and react to advanced internal and external business threats.
The path to policy righteousness demands the right processes, visibility and automation – but...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more