Corero delivers turnkey DDoS visibility and analytics

Corero Network Security has announced the availability of Corero SecureWatch ™ Analytics, a powerful Web-based security analytics portal. The solution delivers turn-key visibility into DDoS attacks and cyber threats with comprehensive and easy-to-read security dashboards powered by Splunk® software, through an agreement with Splunk Inc..

Read More

Enterprise search adoption remains low

Despite the employee productivity benefits that internal enterprise search could bring to any organisation, a new survey reveals only 38% of IT departments responding have invested in or plan to invest in enterprise search capabilities for a range of reasons topped by security concerns. The survey, subject of a new report, included more than 300 enterprise IT security professionals and was conducted by Varonis Systems, Inc. (NASDAQ:VRNS), the leading provider of software solutions for...

Read More


Mobile malware targets trust

Cybercriminals exploit Flappy Bird game’s popularity, other trusted app and service vulnerabilities.

Read More

Organisations blind to location of sensitive data

Informatica Corporation has announced the availability of a new independent research report by the Ponemon Institute LLC, entitled, The State of Data Centric Security. Based on a global survey of more than 1,500 IT and IT security professionals, the study reveals how organizations understand and respond to data security threats in today’s information-everywhere world.

Read More

Organisations overwhelmed by increased security complexities

AccessData says that it has bridged the security gap between prevention-focused mobile device management (MDM) solutions and mobile threat detection and response, by adding mobile device support in the ResolutionOne Platform. ResolutionOne integrates network, endpoint and malware analysis, threat intelligence, end-to-end e-discovery and remediation technologies into a single, scalable platform.

Read More

Ninety-six percent of IT security professionals believe machine identities are central to...
Hackers exploit lack of IT investment to target scientific, medical, economic and defence research.
Respondents point to unsecured network file folders as the biggest vulnerability point leading...
RocketCyber’s managed security operations center (SOC) brings 24x7x365 cybersecurity to Kaseya IT...
New Pulse Policy Secure delivers continuous compliance with enhanced endpoint and IoT visibility,...
Pulse Secure has introduced new Secure Access management and threat mitigation capabilities within...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more