NEWS

Simplifying continuous discovery and protection in the Cloud

CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and potentially-risky Amazon Web Services (AWS) accounts. This version also features new industry-leading Just-in-Time capabilities that deliver flexible user access to cloud-based or on-premises Windows...

Read More

NEWS

Fifty percent increase in Botnet stolen credentials

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019 Annual Cyberthreat Landscape Report providing insights into emerging and evolving cybersecurity trends. The report reveals that botnet stolen credentials increased by a staggering fifty percent in 2017-2018, with technology and telco sectors being the target for over half of those stolen.

Read More

NEWS

IoT devices under constant attack

Cyxtera Technologies has released findings from an extensive research project, the “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots,” showing that IoT devices are under constant attack; more than 150 million connection attempts over 15 months. The report reveals the detection of new attacks on IoT devices, especially those leveraging zero-day vulnerabilities for specific devices. The research was a joint effort by Cyxtera threat researcher Martin Ochoa and...

Read More

NEWS

Verizon refocuses the cyber investigations spotlight on the world of Insider Threats

The Verizon Data Breach Investigations Report (DBIR) series opened the doors to the world of cybercrime – now, this dataset and caseload analysis has been refocused on the role of the insider - forming the Verizon Insider Threat Report.

Read More

NEWS

Only 15 percent of UK enterprises confident in their ability to defend themselves

Inability to detect threats, alongside stretched budgets and talent shortage hampering large organisations’ security programmes.

Read More

NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

McAfee Labs finds stolen medical records available for sale from $0.03 to $2.42 per record.
HCL Technologies has expanded its strategic collaboration with Dell Technologies to provide clients...
Agilitas Launches ‘CONNECT for Enhanced Experiences’ Report.
Over one-third of all security incidents start with phishing emails or malicious attachments sent...
Built on the only unified external cybersecurity platform and combined with leading digital risk...
New Fortinet research reveals escalating cyber risks due to the ongoing talent shortage while the...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more