NEWS

Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More

NEWS

Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals in the UK, Benelux and Nordics, which reveal the latest data points and trends in cybersecurity.

Read More

NEWS

Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.

Read More

Data breaches no longer just an IT problem

Report highlights the damaging impact of data breaches with share prices dropping an average of 5 per cent, customer churn increasing as much as 7 per cent and brand reputation severely tarnished.

Read More


Overconfident and under-prepared

Survey reveals that large numbers of U.K. and U.S. businesses overestimate their readiness to combat cybersecurity breaches, despite most reporting breaches in last 12 months.

Read More

Sophos has introduced an advanced server protection product that combines whitelisting and...
Barracuda has introduced the new Barracuda Vulnerability Manager, a cloud-based service to help...
FIPS 140-2 compliance assures companies and government agencies that CipherCloud’s products...
Relationship improves information sharing with innovative research and initiatives.
77 per cent of respondents not confident their organisation complies with data protection...
Two-year study explores the roles of information security leaders and how they are affected by...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more