Varonis helps U.S. Dept. of Homeland Security fend off data breaches

Varonis Systems has been added to the U.S. Department of Homeland Security’s and General Services Administration (GSA) Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring as a Service (CMaaS) Blanket Purchase Agreement (BPA). Varonis has been added to the BPA held by Technica Corporation, one of its solutions partners in the federal government space.

Read More

BeyondTrust enriches threat analytics with new firewall connectors

BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic view of risk with a new Clarity Threat Analytics connector for analyzing Palo Alto Networks firewall data, backed by the addition of real-time threat alerting capabilities.

Read More

Almost half of French enterprises plan to increase their ICT budget this year

A new survey from market researcher Kable shows that 46% of French enterprises are planning to increase their ICT budget this year, an increase of 18% from 2014. With the economy in France gradually warming up, French enterprises are investing in newer ICT domains to reap the benefits of technology in a rapidly changing digital marketplace. Kable’s survey shows that almost half (46%) of French enterprises are planning to increase their overall ICT budgets in 2015 – an increase of...

Read More

Two in five British adults affected by data breaches

Individuals are putting themselves at increased risk of identity theft by failing to follow the basics of online identity protection.

Read More

Call for more public-private cooperation over cybersecurity

Information technology (IT) executives within critical infrastructure organisations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with escalating cybersecurity threats, according to a survey released today by The Aspen Institute and Intel Security. A majority (76%) of survey respondents also indicated they believe a national defence force should respond when a cyber attack damages a critical infastructure company within national...

Read More


Security concerns intensify with challenges over remote worker access.
As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in...
Prevalence of breach attempts can be attributed to reliance on cloud as work-from-home era...
Sophos has announced new versions of key products that deliver on the company’s vision of...
Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...
As IT spend moves to line of business managers, and with more than half spending at least 70% of...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more