Saturday, 20th April 2019
Logo
NEWS

Historic vulnerabilities and network complexity pose ongoing security risks

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business. The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched vulnerabilities, along with growing network and application complexity.

Read More

NEWS

Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More

NEWS

Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. According to a new social media poll by NTT Security, the specialised security company and centre of excellence in security for NTT Group, the majority (59 per cent) of respondents admit they are not confident their company could resume ‘business as usual’ after the first 24 hours, although 41 per cent say they are.

Read More

NEWS

87 percent of security professionals say world is at cyberwar

Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.

Read More

NEWS

UK Boards of biggest firms must do more to be cyber aware

Many FTSE 350 boards still don’t understand the impact of a cyber attack on their business.

Read More

NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing legislatio...

Read More

Imperva has released its Q2 2017 Global DDoS Threat Landscape Report, a statistical analysis of m...
Media companies are investing heavily in advanced information and communications technology (ICT)...
24 percent of critical infrastructure employees have already connected an Internet of Things devi...
Dutch airline reduces provisioning time for large, seasonal workforce.
Half (52%) of UK CIOs view increased security risks as biggest challenge associated with moving I...
Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more