End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.

Read More

Playing it safe in the Cloud

For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell, CTO, Swivel Secure, writes.

Read More

ExtraHop and macmon secure form technology alliance

ExtraHop and macmon secure have announced a technology alliance. Together, macmon and ExtraHop will deliver the strongest threat detection and response solutions on the market to its joint customers and partners.

Read More

Trustwave and Palo Alto Networks forge Managed Security Services pact

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation managed security services to global, multi-national businesses and government agencies.

Read More



AlienVault USM selected to extend the security management of the Malta Information Technology...
Human error is the top cause of serious breaches but malicious attacks are IT leaders’ biggest...
With data breaches and security vulnerabilities increasing year after year.  Matt...
New survey finds insider threats are on the rise, despite organizations’ focus on defending...
Passwords are a cornerstone method for securing access to data. However, a new survey...
Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more