Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection and Directory Traversal.

Read More

Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More

Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past 12 months; growing complexity of security estates highlighted as a significant risk.

Read More

WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified Threat Management (UTM) platform - the WatchGuard XTM product series - that simplifies compliance with leading regulatory standards worldwide. Users can select from a pre-configured library of more than 200 rules that monitor multiple file types, standards and sensitive data. This includes National Insurance numbers and other Personally Identifiable Information (PII), and can enable complex checks...

Read More

NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third party public service users to over 5,000 later this year, delivering secure data transfers and ensuring compliance across the healthcare industry.

Read More

ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide fundamental services, the related risk becomes more significant. Global IT association ISACA has released a new guide applying the internationally accepted COBIT 5 governance framework to help enterprises effectively manage vendors.

Read More

Response and recovery have significant impact on 58% of targeted businesses.
Data studied by Atlas VPN reveals that blackmail and ransomware attacks spiked by 140% in 2019 in...
Wipro has released its 2019 State of Cybersecurity Report that highlights the rising importance of...
Half of all UK businesses (49%) believe they have unknown third-party devices on their networks, an...
HP urges businesses to protect the endpoint - new report highlights that the enterprise has become...
BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more