Steganography - the next big security threat?

While analysing multiple cyberespionage and cybercriminal campaigns, Kaspersky Lab researchers have identified a new, worrying trend: malicious hackers are increasingly using steganography – a digital version of an ancient technique of hiding messages inside images - to conceal the...

Read More
NEWS
Malicious content delivered over SSL/TLS has more than doubled in six months

Researchers share latest findings from the Zscaler cloud showing increasingly sophisticated malware strains using SSL to encrypt activity.

Read More
NEWS
Data loss is the major Cloud concern

Alert Logic has published the results of a comprehensive research, “Cybersecurity Trends 2017 Spotlight Report,” that explores the latest cybersecurity trends and organisational investment priorities among companies in the UK, Benelux and Nordics.

Read More
PAM platform available on Google Cloud

Broad cloud support is a BeyondTrust priority, having the only complete PAM platform available on Google Cloud, Amazon Web Services and Microsoft Azure Marketplace.

Read More
Honeywell completes Nextnine acquisition

Addition of Nextnine further strengthens Honeywell’s leadership in industrial cyber security.

Read More
Pulse secures virtual Application Delivery Controller (vADC) business from Brocade Communications Systems

Acquisition will further strengthen Pulse Secure’s leadership position in Secure Access...

Read More
CSPi stands up cybersecurity division

CSPi (NASDAQ:CSPI), a provider of advanced security products and security services, as well as IT...

Read More
NEWS
DDoS attacks are longer and 'more demanding'

The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The...

Read More
NEWS
Enterprise IT leaders demanding more stringent cyber security from suppliers

Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...

Read More
NEWS
Legacy data systems present a red flag for GDPR compliance

Nearly a third of US and European CIOs can’t guarantee that they’d be able to find customer...

Read More
Cybersecurity in 2017: What to expect for the rest of the year

NordVPN provides cybersecurity predictions for the rest of the year and offers advice on...

Read More
MapR and Talend collaborate

Combined offering accelerates GDPR compliance by addressing key requirements around data inventory,...

Read More
NEWS
Companies failing to measure cybersecurity effectiveness and performance

Security Measurement Index benchmark survey shows nearly a third blindly making cybersecurity...

Read More
Gigamon launches Defender Lifecycle Model

Pervasive visibility and automation critical to rapidly detect and mitigate security risks.

Read More
Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of...

Read More

Videos

Data Centre World 2026
Data Centre World 2026
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Brett Candon, VP International, Dropzone AI.
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.