BLOG

IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation...

Read More

NEWS

Security for the hybrid enterprise

New SaaS-based security solution powered by Amazon VPC traffic mirroring empowers enterprise SecOps teams to build a cloud-first approach to securing the hybrid attack surface..

Read More

NEWS

Security in the cloud - risk versus reward

According to a new CyberArk survey, as organisations increasingly move critical applications, regulated customer data and development work into public cloud environments, 32 percent of UK organisations say the number one benefit for moving workloads to the cloud is to offload security risk. This is despite many public cloud providers providing straightforward guidance on their shared responsibility models for security and compliance in cloud environments.

Read More

NEWS

Large enterprises struggle to protect critical network assets from cyberattacks and outages

Research conducted by Endace and VIB identifies the economic, resourcing, and management challenges that large enterprises face in protecting their networks.

Read More

NEWS

Cybersecurity concerns threaten M & A activity

Global research survey discovers that 65% of respondents experience buyers’ remorse after closing an M&A deal due to cybersecurity concerns.

Read More

VIDEO

Protecting the frontlines of cybersecurity from nanoscale to enterprise-scale

By 2021, it’s estimated that cybercrime will cost the world economy more than $6 trillion. In our hyper-connected world, every device is storing and computing data making it a potential touch point for intrusion by a cybercriminal, ransomware, or malware. Understanding the shifting threat landscape is crucial to safeguarding data. This is why Hewlett Packard Enterprise is building security into everything we do. Explore how security innovations from Hewlett Packard Labs make into product...

Read More

Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution.
Fears over employees ignoring security advice and ransomware attacks evolving beyond company...
Darktrace and HackerOne have partnered to combine Darktrace PREVENT/Attack Surface Management™...
Latest research from Neustar reveals across-the-board growth in attacks of all sizes.
SailPoint Technologies Holdings has unveiled the SailPoint Predictive Identity™ platform, the...
Huntsman Security has launched its Cyber Essentials monitoring solution, allowing organisations to...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more