NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

NEWS

Cybercriminals earning over $3B annually exploiting social platforms

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining has seen social media-enabled cybercrimes grow by more than 300-fold.

Read More


BLOG

Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just hasn’t been able to respond to the challenge fast enough, resulting in successful hacks that have resulted in data loss, and malicious cybersecurity...

Read More


NEWS

Cybersecurity spending will reach $223.7 billion by 2024

Cyber security revenues in 2018 were $160.2 billion and will jump an enormous $11.2 billion during 2019, as the focus moves to GDPR adherence and adherence to similar legislation. Growth slows to around $9.8 billion per annum after this but then spikes once again in 2023/4 as AI based Cybersecurity escalates, reaching $223.7 billion.

Read More

A third of business still don’t have an emergency response plan in place, despite 78% of...
Half of CISOs say their organisation’s desire for growth and rapid digitalisation is detrimental...
Security professionals anticipate automation will reduce IT security headcount, but not replace...
Ping Identity has released results from its 2019 Consumer Survey: Trust and Accountability in the...
Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.
McAfee sees attackers shift from mass-spread campaigns to fewer, more lucrative targets.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more