Kaspersky Lab researchers have examined the security of applications for the remote control of cars from several well-known car manufacturers. As a result, the company’s experts have discovered that all of the applications contain a number of security issues that can potentially allow criminals to cause significant damage for connected car owners.
Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .
Trust now outnumbers distrust for public clouds by more than 2-to-1.
RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that helps operationalize Business-Driven Security™ architecture by helping to reduce business risk through systematic and continuous enablement for clients to manage identity, protect their assets, and detect, respond and recover from cyber attacks.
Global cybersecurity leader Forcepoint has established four market-centric business units. Forcepoint’s businesses – Cloud Security, Network Security, Data & Insider Threat Security and Global Governments – will drive innovation across each product portfolio, while teaming to deliver systems that enable companies to provide open, unobstructed access to critical data and intellectual property everywhere, while reducing risk.
New SafeNet Luna HSM and 100 Gbps high-speed encryptors provide the industry’s fastest speeds and performance to encrypt data.
Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.
International study of 3,000 businesses shows widespread variations in cyber security readiness.
Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR) creates more transparency on cyber-security.
Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing cybersecurity skill shortage before the 2020 Olympics.
Spirent Communications has warned of the increased likelihood of disruptions this year to a wide variety of civil and military applications relying on global navigation satellite systems (GNSS) – GPS, GLONASS, Galileo, and BeiDou.
On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to Detection” to six hours.
Metasploit becomes first general-purpose penetration testing tool to link directly to hardware to help better secure expanding IoT ecosystem.
a provider of award winning business continuity services, and Zerto, a
leading provider of IT resilience solutions, has published the findings from a legal industry IT roundtable on the challenges of cloud
and dangers of cybercrime.
Bad information management practices leave fledgling business over exposed to risk.
Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from network and security professionals at the world’s leading service provider, cloud/hosting and enterprise organisations. The report covers a comprehensive range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges internet operators face daily from network-based threats and the strategies adopted to address and mitigate them.
Trustwave and Osterman Research have released results of a new study on cybersecurity resource limitations that quantifies the challenges businesses face around recruitment of IT security talent, identification of the skills sets they require, the level of control they have over their IT security budgets, and other pertinent matters related to IT security management. The study reveals that corporate security demands still outpace the available talent at alarming rates.
By Mike Hemes, Regional Director, Western Europe, A10 Networks.
More than half remain unaware of new EU General Data Protection Regulation (GDPR); Majority calls for improved collaboration among security vendors.
Only 30% of consumers believe companies are taking their personal data protection very seriously.