NEWS

The Red Cloak of security

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak , a fully-managed SaaS solution armed with revolutionary endpoint threat detection and monitoring capabilities. With lightweight sensors that can be provisioned in minutes for organizations to download to their endpoints, AETD Red Cloak can scale via a cloud delivery model to any size environment and slash the time required to detect and respond to cyber-attacks from months or weeks to hours or...

Read More

Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as a Service (IaaS) initiative. In addition, the SDP working group is hosting its fourth Hackathon throughout the RSA Conference, with a top prize of $10,000 available to the first participant to either access or disrupt a cloud-based mission critical application.

Read More




NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

Global manufacturer benefits from cost savings and operational efficiency through unsurpassed...
Addressing customers' needs to combat zero-day attacks and advanced persistent threats (APTs),...
WatchGuard report uncovers massive increases in endpoint attacks, rising encrypted malware rates,...
AppRiver’s Global Security Report shows business is booming for online extortionists.
The EU is to impose new data protection legislation to ensure better protection of the personal...
Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more