Firms missing out with do-it-yourself approach to Threat Intelligence

IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing confidence in managed security services.

Read More


A 2015 top ten global hack attack list

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

Executives overly reliant on compliance metrics to measure security programme effectiveness

Seventy-nine percent of IT security professionals report to executive management on compliance, yet 59 percent say threat detection metrics are most critical.

Read More

PowerBroker for Sudo simplifies system management

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More

Okta, CrowdStrike, Netskope, and Proofpoint to deliver integrated product solutions, advanced...
ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...
New research from Databarracks reveals organisations are benefiting from increased investment in IT...
Gemalto has released the findings of the Breach Level Index for the first six months of 2015,...
Security awareness training must be given more importance as likelihood of human error leading to a...
Cylance Inc. has introduced its virtual chief information security officer (vCISO) service, a...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more