Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More

More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More


Firehost appoints new Chief Security Officer

FireHost, the secure cloud provider, has appointed retired US Army Col. Jeff Schilling as chief security officer (CSO). In this new position, Schilling will bolster FireHost’s industry leadership and fuel its growing momentum in providing compliance- and security-driven businesses a truly secure cloud without compromise.

Read More


Increase in phishing and ransomware attacks - along with continued high numbers of Web Application...
With LogRhythm Cloud, security analysts get the full analyst experience of an award-winning...
With the majority of companies believing the future of work will be remote or “hybrid”, Tessian...
Centrify encourages businesses to increase their Identity and Access Management maturity to...
Yet only four out of 10 security leaders in the UK can answer the question, “How secure, or at...
New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more