NEWS

2.8M UK businesses vulnerable to IoT and OT cyber-attacks

Half of all UK businesses (49%) believe they have unknown third-party devices on their networks, an increase of 110,000 since last year.

Read More

NEWS

Cloud and mobile are the weakest links

Third instalment of 2019 Security Report highlights the cloud and mobile attack vectors used to target enterprises: nearly 1 in 5 organizations experienced a cloud security incident in the past year.

Read More

NEWS

Users are the biggest security concern

Despite concerns, organisations lack the budget (75 per cent) and training (80 per cent) to combat threats.

Read More


NEWS

Mobile biometric authentication on the increase

By 2022, Gartner, Inc. predicts that 70 per cent of organisations using biometric authentication for workforce access will implement it via smartphone apps, regardless of the endpoint device being used. In 2018, this figure was fewer than 5 per cent.

Read More

NEWS

CrowdStrike partners with Mercedes-AMG Petronas Motorsport

CrowdStrike has formed a Global Partnership with five-time consecutive FIA Formula One™ World Constructors' Champions Mercedes-AMG Petronas Motorsport to protect the team from cyberattacks throughout the coming seasons.

Read More

Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely...
Despite 95 percent of CIOs expecting cyberthreats to increase over the next three years, only 65...
FireEye, Inc.has unveiled two new insider threat security services from Mandiant®. The new...
McAfee has released its McAfee Threats Report: April 2021, examining cybercriminal activity related...
Zscaler has published a new study that examines hidden vulnerabilities found in enterprise virtual...
The COVID-19 pandemic created enormous challenges for businesses worldwide – and cybersecurity...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more