BLOG

Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More

NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

Rise in supply chain security breaches

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Incident response takes two working days

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

NEWS

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth annual Fal.Con cybersecurity conference. These new offerings showcase the CrowdStrike Falcon® platform and CrowdStrike’s continued innovation in the security space and give Security, IT and DevOps teams the comprehensive tools needed to stop breaches and stay two steps ahead of today’s adversary.

Read More

NEWS

HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More

Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Trustwave has released the 2020 Trustwave Global Security Report, which reveals the top security...
Multi-vendor solution combined with shared responsibility strengthens security, simplifies...
The Information Security Forum (ISF), the trusted source that senior security professionals and...
Positive Technologies has released its most recent Cyber Threatscape report, an analysis of Q2 2020...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more