BLOG

Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More

NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

AT&T Managed XDR provides autonomous endpoint protection

AT&T is launching a managed Extended Detection and Response (XDR) offering. The AT&T Managed XDR solution features a cloud-based security platform with security threat analytics, machine learning, and third-party connectors to protect endpoint, network, and cloud assets with automated and orchestrated malware prevention, threat detection, and response. Through the combination of best-in-class technologies and 24/7 security monitoring, AT&T Managed XDR helps organisations to detect, respond, and...

Read More

NEWS

Rise in supply chain security breaches

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Crowdstrike joins forces for XDR initiative

Members including Google Cloud, Okta, ServiceNow, Zscaler and others join forces to establish a shared schema for XDR data exchange, providing customers with an integrated, best-of-platform approach to XDR.

Read More

NEWS

Incident response takes two working days

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the...
As cloud transformation accelerates, ThycoticCentrify’s cloud provider solution for AWS provides...
Research uncovers critical cybersecurity and compliance risks.
Versa Networks has published the book SASE For Dummies.
Due to the current pandemic, and the ensuing remote work, many organisations have now had to change...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more