NEWS

SMBs would consider a cybersecurity-inspired IT switch

Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne and commissioned by ConnectWise, the leading provider of intelligent software and expert services for technology solution providers (TSPs).

Read More

NEWS

Highly effective CISOs in short supply?

Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner CISO Effectiveness Index, according to a survey by Gartner, Inc.

Read More

NEWS

Cyber deception reduces data breach costs

Attivo Networks has published the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.” The paper identifies the direct and measurable financial and productivity benefits of deception technology for organizations of all types and sizes.

Read More

NEWS

CISOs fear cyberwarfare

Seven in every ten CISOs (71%) believe cyberwarfare is a threat to their organisation, and yet just over a fifth (22%) admit to not having a strategy in place to mitigate this risk. This is especially alarming during a period of unprecedented global disruption, as half of infosec professionals (50%) agree that the increase of cyber warfare will be detrimental to the economy in the next 12 months.

Read More

NEWS

Red tape restricts industrial cybersecurity initiatives

The recent Kaspersky report ‘State of Industrial Cybersecurity in the Era of Digitalisation’ has revealed the main barriers that inhibit or delay implementation of industrial cybersecurity projects. The most common obstacles include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). These barriers may become a critical point in light of COVID-19 because they can affect the implementation of...

Read More

NEWS

Insider threat partnership

Joint solution integrates detection, automated investigations and incident response capabilities to reduce risks caused by compromised, negligent or malicious insiders.

Read More

While attack vectors remain largely the same year over year, attack volume will increase and...
Solutions address increasing flood of security incidents caused by mismanaged identities, helping...
Mit LanGuard 2014 R2 bringt GFI Software eine neue Version seiner preisgekrönten...
As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more