Trustwave and Osterman Research have released results of a new study on cybersecurity resource limitations that quantifies the challenges businesses face around recruitment of IT security talent, identification of the skills sets they require, the level of control they have over their IT security budgets, and other pertinent matters related to IT security management. The study reveals that corporate security demands still outpace the available talent at alarming rates.
Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organisations are ill-prepared for the risks they pose, according to a research report issued from Ponemon Institute, IBM Security, and Arxan Technologies, the trusted provider of application attack prevention and self-protection solutions. The “2017 Study on Mobile and Internet of Things Application Security” aims to illustrate practices and opinions among IT and IT security practitioners.
F5 Networks has revealed data from its Security Operations Center (SOC) highlighting the growing scale and intensity of cyber-attacks in the region.
By Mike Hemes, Regional Director, Western Europe, A10 Networks.
More than half remain unaware of new EU General Data Protection Regulation (GDPR); Majority calls for improved collaboration among security vendors.
Barracuda has launched its new Vulnerability Remediation Service, expanding its award-winning Web Application Firewall product line and further simplifying the way web application security is deployed and managed.
New One Identity Connect for Cloud extends governance and compliance reporting for cloud, hybrid and on-premise applications.
Only 30% of consumers believe companies are taking their personal data protection very seriously.
Research finds 57 per cent rank security and compliance as biggest IT challenge.
The proliferation and use of devices such as personal smart phones and tablets at work, commonly called bring your own device (BYOD), is one the biggest cybersecurity threats faced by SMEs, according to Kevin Timms, COO and co-founder of IT services aggregator, Streamwire. This and a general lack of awareness at the board level are the primary issues that need to be tackled in 2017.
Cb Response 6.0 is said to be the only solution with instant and complete visibility to pinpoint an attack’s root cause in minutes, going far beyond Tanium’s “search” capabilities.
In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.
Customers benefit from new security service integrated into BT’s cloud portfolio.
Checkmarx has appointed Shmuel Arvatz as the company’s new chief financial officer (CFO).
ExtraHop has published its top predictions for enterprise IT in 2017. Based on insight from customers, partners, and industry analysts and insiders, leaders at ExtraHop offer the following forecasts for IT in 2017:
Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching consequences.
Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.
Seven start-ups, focusing on online security issues and threats, will join the new GCHQ Cyber Accelerator, powered by Wayra UK.
Cryptzone has launched the newest version of AppGate, which enables organizations to easily deploy a Software-Defined Perimeter (SDP) for granular access control. The release of AppGate 3.0 furthers Cryptzone’s vision for transformational network security – where all network services adopt an identity-centric security model.
Ken Xie, founder, chairman of the board and chief executive officer at Fortinet “The demands of today’s digital economy are driving increasingly complex networks that require highly skilled and rare talent to design, deploy, operate, and most importantly secure. Today’s point products and platform security solutions simply aren’t capable of providing the solution breadth, processing performance, or advanced automation necessary to address these demands. It’s clear that traditional approaches to security are quickly becoming unsustainable. The Fortinet Security Fabric delivers the broad, powerful, and automated security solutions needed to solve today’s challenges while laying the foundation for the self-sufficient, Intent-Based Network Security that will be critical to protect tomorrow’s enterprises.