Qualys expands Its Cloud Platform

New solution enables customers to address security for containers in their DevOps pipeline and deployments across cloud and on-premises environments.

Read More

ThreatConnect partners with CenturyLink for managed security services

ThreatConnect provides managed security services providers the ability to offer more premium services.

Read More

NEWS

The sorry state of affairs of software components

Synopsys has released its report, “The State of Software Composition 2017,” which analyses real-world data to investigate the security of the software supply chain ­ one of the most significant challenges the software industry faces today. The report summarises the analysis of 128,782 software applications, which identified 16,868 unique versions of open source and commercial software components containing almost 10,000 unique security vulnerabilities.

Read More


Vectra Networks identifies technology sector as most resilient to cyber attacks

Research finds rates of reconnaissance, lateral movement, and exfiltration detections increased by over 265 per cent.

Read More

High-Tech Bridge releases application security trends report

The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

Read More

400% increase in OpenVPN Attacks and 86% rise in short duration floods while the risk of a repeat...
Cost per DNS attack increased by 12% in healthcare, the sharpest rise; healthcare also most likely...
Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...
Two 4SECURail teams aim to design a Computer Security Incident Response Team (CSIRT) for joint...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
AlgoSec, the leading provider of business-driven security policy management solutions, has...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more