NEWS

Endpoint security issues

Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report that analyses the ongoing security risk of popular websites and software.

Read More

NEWS

Compromised credentials a top concern

Length of investigations, limited resources, and lack of context put security professionals at a disadvantage when responding to security incidents.

Read More

BLOG

Top information security threats for 2016

As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face in the next 12 months.  While some of these trends started in 2015 and are expected to continue, others will bring new challenges for security professionals.

Read More

iSheriff names John Mutch as CEO

iSheriff, a leading cloud security company, has appointed John Mutch as its new Chief Executive Officer (CEO) and a member of its board of directors, effective immediately. As CEO, Mutch is responsible for the future direction of the organisation and leading the company’s overall operations, with direct oversight of sales, marketing, professional services, R&D and corporate strategy.

Read More

79% of CIOs are concerned that users might ignore IT policies and guidelines, increasing security...
CrowdStrike announces acquisition of SecureCircle to enable customers to gain visibility and...
Third instalment of 2019 Security Report highlights the cloud and mobile attack vectors used to...
With 2018 on the horizon, experts are readily analysing and making predictions about the types...
The flexible, comprehensive and cost-effective platform provides layered security to MSPs and...
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more