Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection and Directory Traversal.

Read More

Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More

Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past 12 months; growing complexity of security estates highlighted as a significant risk.

Read More

WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified Threat Management (UTM) platform - the WatchGuard XTM product series - that simplifies compliance with leading regulatory standards worldwide. Users can select from a pre-configured library of more than 200 rules that monitor multiple file types, standards and sensitive data. This includes National Insurance numbers and other Personally Identifiable Information (PII), and can enable complex checks...

Read More

NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third party public service users to over 5,000 later this year, delivering secure data transfers and ensuring compliance across the healthcare industry.

Read More

ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide fundamental services, the related risk becomes more significant. Global IT association ISACA has released a new guide applying the internationally accepted COBIT 5 governance framework to help enterprises effectively manage vendors.

Read More

Survey reveals that half of MSPs now manage their customers’ compliance obligations.
LogRhythm’s NextGen SIEM Platform provides a single solution for proactively identifying,...
Gavin Millard, EMEA technical director, Tenable Network Security shares 2016 predictions.
AT&T Managed Endpoint Security with SentinelOne provides comprehensive endpoint protection for...
On average, UK organisations need an additional £1.88m and 22 new IT staff each to shorten the...
Ponemon research finds that IT Security underestimates the value of business assets by over 50% .
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more