FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More

Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary Next Generation Firewall (NGFW). The release enables straightforward integration between the Stonesoft Security Management Center and 3rd party management systems as well as expands the virtual engine support to all available network security roles of Stonesoft NGFW.

Read More


As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes...
$400mn agreement sees HCL take prime responsibility for running infrastructure and application...
IT decision makers are facing major challenges between dynamic adversaries, significant legislation...
Gartner, Inc. has revealed its top predictions for IT organizations and IT users for 2014 and...
Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more