End users demand DDoS protection from ISPs

Corero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.

Read More

Nuclear attack security risk is growing

The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial ‘off-the-shelf’ software, according to a major new report from Chatham House.

Read More

FireEye and F5 announce global partnership

Strategic alliance combines advanced application delivery technologies with sophisticated threat management for applications and data centers; unifies customer engagement and solution deployment worldwide.

Read More

Trustwave and Palo Alto Networks forge Managed Security Services pact

Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation managed security services to global, multi-national businesses and government agencies.

Read More



Findings show that security concerns are a major concern for the majority of businesses considering...
Cybersecurity specialisation and services linked to the Internet of Things lead the next wave of...
Inaugural CybSafe Supplier Cyber Security Study reveals SME must increasingly prove cyber...
Despite increase in cases during lockdown, one-in-five admit they couldn’t access a working...
83% of survey respondents report the rise in remote workers increases the risk of a security...
Versa Networks has published the book SASE For Dummies.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more