BLOG

Out of the Frying Pan and into the Firewall

Why the Kitchen and Enterprise IT Have More in Common Than it Seems. By Sharon Mandell is Senior Vice President and Chief Information Officer at Juniper Networks.

Read More

NEWS

Trend Micro reveals over half of Security Operation Centers are overrun with redundant security tools

Trend Micro has revealed that global organizations have on average 29 security monitoring solutions in place, complicating Security Operations Center (SOC) efforts to prioritize alerts and manage cyber risk effectively.

Read More

NEWS

Rise in supply chain security breaches

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem.

Read More

NEWS

Incident response takes two working days

One in four UK organisations cite the volume of false positives as being one of the biggest challenges facing their business.

Read More

NEWS

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth annual Fal.Con cybersecurity conference. These new offerings showcase the CrowdStrike Falcon® platform and CrowdStrike’s continued innovation in the security space and give Security, IT and DevOps teams the comprehensive tools needed to stop breaches and stay two steps ahead of today’s adversary.

Read More

NEWS

HP threat research shows attackers exploiting zero-day vulnerability before enterprises can patch

HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

Read More

Ping Identity’s flexible solutions improve customer experience and help achieve compliance.
ETIS – The Global Association for Telecommunications has joined forces with Proximus, KPN,...
Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working...
Trend Micro Zero Trust Risk Insights reveals and prioritizes risks for better decision making.
Network management company Infoblox and its Cyber Intelligence Unit (CIU), have released the latest...
Passwords are a cornerstone method for securing access to data. However, a new survey...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more