FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More

Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary Next Generation Firewall (NGFW). The release enables straightforward integration between the Stonesoft Security Management Center and 3rd party management systems as well as expands the virtual engine support to all available network security roles of Stonesoft NGFW.

Read More


Acquisition extends the Digital Guardian Data Aware Endpoint Security Platform to fixed- function...
FireHost has announced the release of its 2013 year in review Superfecta report (available for...
Survey reveals security professionals don’t practice what they preach when it comes to...
According to The State of Cloud Security 2020, a global survey from next-generation cybersecurity...
More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more