Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat Protection solution. The expanded solution now incorporates threat intelligence from a variety of commercial and community best-of-breed threat intelligence offerings including Check Point Software, Cisco, CrowdStrike, Lastline, Palo Alto Networks and Soltra, the STIX TAXII communication platform.

Read More

NEWS

A single data protection law for Europe - what does it mean?

EU Parliament has announced that wants single data protection law in place by end of 2015. This law, the General Data Protection Regulation (GDPR), is due to be passed through European Parliament. It will impact any organisation that gathers, processes and stores personal data. Here, Alesandro Porro, VP of International at Ipswitch outlines what difference the GDPR is likely to have on businesses and organisations in 2015. 

Read More

NEWS

Cybersecurity hub promises single standards database

The hub will be the first of its kind, enabling companies to quickly scope, define and maintain all major cybersecurity requirements and frameworks in one place.

Read More


NEWS

One billion data records compromised during 2014

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with cybercriminals targeting identity theft as top breach category.

Read More

New Group wide initiative will enable organisations to embrace digital transformation securely.
New threat intelligence from F5 Labs shows that Europe suffers more attacks from within its borders...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and...
Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more