How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from cloud visibility and enablement company, Skyhigh Networks, suggests that only 1 in 100 cloud providers meets these requirements to date.

Read More


With data breaches and security vulnerabilities increasing year after year.  Matt...
Varonis Systems has introduced an “Express” version of its Unstructured Data Risk...
CompTIA releases new whitepaper on current and future threats based on input from cybersecurity...
The Japanese Bankers Association (JBA) will employ a Fujitsu cloud service-based blockchain...
Radware launches new Hybrid Cloud WAF Service – a fully-managed service that provides...
Just under 70% also say they are preparing for an inevitable data breach.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more