Saturday, 16th October 2021
Logo
NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

Rise in supply chain security breaches

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Incident response takes two working days

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

NEWS

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth annual Fal.Con cybersecurity conference. These new offerings showcase the CrowdStrike Falcon® platform and CrowdStrike’s continued innovation in the security space and give Security, IT and DevOps teams the comprehensive tools needed to stop breaches and stay two steps ahead of today’s adversary.

Read More

NEWS

HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More

NEWS

SonicWall offers hybrid choice

Company’s virtual offerings, cloud services match with on-premises deployments to solve real-world security challenges for SMBs, enterprises, governments and MSSPs.

Read More

Cylance, the company that is using artificial intelligence to proactively prevent advanced persiste...
While a majority of IT professionals believe the secure sharing and transferring of files is very...
Only a quarter (27%) of consumers feel businesses take customer data security very seriously.
2017 has been an interesting year for cyber security. With hacks still dominating the headlines...
Beyond Identity selects Ignition Technology to drive channel expansion in the Nordics and Benelux.
TIBCO Software has formed an official partnership with Ping Identit. Together, TIBCO Cloud™ Mashery®...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more