NEWS

Almost 10 percent of IT assets are vulnerable to exploitation

eSentire has released its Q1 2019 Quarterly Threat Report which reveals that 8% of externally-facing IT assets are susceptible of being exploited by a high or critical severity vulnerability as classified by the Common Vulnerability Scoring System (CVSS) v3.0 used by the National Vulnerability Database (NVD).

Read More

NEWS

Plans for zero trust projects

UK large enterprises use the most security tools although 1 in 5 in the DACH region plan to increase security spending by over 25%.

Read More

NEWS

Vectra raises $100 million

Financing to drive further global expansion in the $12.7 billion cloud security market.

Read More

NEWS

Critical shift in security responsibilities

As C-level executives engage more frequently in incident response and threat hunting, more IT professionals are missing security events and alerts due to poor legacy app integrations.

Read More

NEWS

Imperva to acquire Distil Networks

Imperva will integrate the Distil Networks’ solution into the Imperva security stack to deliver complete protection for applications and APIs, wherever they reside.

Read More

NEWS

BeyondTrust publishes 2019 Privileged Access Threat Report

BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and improved integration are vital to tackling the modern threat landscape.

Read More

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...
By David Myers, ADT Fire & Security.
15% contained personally identifiable information (PII), putting individuals at risk of becoming...
The pandemic-driven shift to remote work has significantly changed how companies are investing in...
Thycotic has published its 2019 State of PAM Maturity Report. The report summarizes the aggregate...
The vast majority of enterprise end users (85%) want their Internet Service Providers...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more