End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.

Read More

Playing it safe in the Cloud

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell, CTO, Swivel Secure, writes.

Read More

ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More

Trustwave and Palo Alto Networks forge Managed Security Services pact

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation managed security services to global, multi-national businesses and government agencies.

Read More



Seed funding enables the start-up to tackle the biggest cyber threats to business: their own...
MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device.
CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...
New report looks at why these low-volume attacks are so costly, and how to protect your business...
Glasswall Solutions has released its latest research report “Keeping the Enterprise Secure: A...
Broad cloud support is a BeyondTrust priority, having the only complete PAM platform available on...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more