Splunk for enterprise security

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for Enterprise Security.

Read More




UK and US professionals agree that people are the most frequent point of failure in IT Security

A survey amongst 250 IT security professionals, conducted during this year’s Infosecurity Europe show, has revealed that 20% of organisations believe malicious insiders pose the biggest threat to their security. A further 44% suggest employee’s ignorance could also cause defences to crumble. Hardly surprising, then, that this audience firmly pointed the finger at ‘people’ (70%) as the most frequent point of failure in an organisation’s IT security, with 20% citing...

Read More

Cloud hardware spending breaks $4 billion mark

A new International Data Corporation (IDC) study confirmed that cloud is the major disruption factor in the EMEA infrastructure hardware market, accounting for a growing portion of hardware spending and exerting influence on hardware architectures and vendors' strategies. The overall investment in hardware for cloud environments in EMEA is expected to exceed $4 billion in terms of user value by the end of 2014, with a strong 19% YoY growth. 15% of the infrastructure spend in EMEA will be...

Read More

Tenable's  research team has discovered a zero-day vulnerability which would allow cybercriminals...
Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a...
BeyondTrust and SINEVIS will work to establish Privileged Access Management as the foundational...
DDoS attacks rose to the highest level on record last year as cybercriminals took advantage of the...
Cybercriminals exploit Flappy Bird game’s popularity, other trusted app and service...
New AI-based breach mitigation automatically detects and remediates zero day threats and evasive...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more