LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) warnt seit langem vor massiver Cyber-Spionage

Read More

25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by Tripwire of 102 financial organizations and 151 retail organizations in the U.K., all of which process card payments. The survey results indicate that recent data breaches have had little impact on the security controls of retail and financial organisations. Of those surveyed, 35 percent said it would take as long as two to three days to detect a breach on their systems and 44 percent admitted...

Read More

Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced Persistent Threat." The report presents an in-depth view of how some techniques attributed to so-called Advanced Persistent Threats (APTs) require only basic technical skills. The report exposes simple ways that attackers are obtaining access privileges and accessing protected data by targeting weaknesses of the Microsoft NTLM protocol using nothing more than knowledge of common Windows...

Read More

LogMeIn acquires Ionia

LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected solutions. The move is part of a larger strategy to accelerate LogMeIn’s IoT opportunity by helping early customers of its Xively Cloud Services platform quickly go to market with their connected offerings.

Read More

Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security intelligence to end users.

Read More

Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 per cent were “secure breaches,” or breaches where strong encryption, key management, or authentication...

Read More

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile...
Major updates across XtremIO, VMAX3, VCE, VNX, Data Domain and Data Protection Suite portfolio.
Centrify has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready for its Centrify...
Gartner has highlighted the top technologies for information security and their implications for...
Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...
Juniper Networks has unveiled Firefly Suite, a virtualised security portfolio that provides...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more