VIDEO

Cisco Stealthwatch - network and cloud threat detection

It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.

Read More

BLOG

Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and fortress-like mentality. By Scott Gordon (CSSP), CMO, Pulse Secure.

Read More

BLOG

IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation...

Read More

NEWS

Security for the hybrid enterprise

New SaaS-based security solution powered by Amazon VPC traffic mirroring empowers enterprise SecOps teams to build a cloud-first approach to securing the hybrid attack surface..

Read More

NEWS

Security in the cloud - risk versus reward

According to a new CyberArk survey, as organisations increasingly move critical applications, regulated customer data and development work into public cloud environments, 32 percent of UK organisations say the number one benefit for moving workloads to the cloud is to offload security risk. This is despite many public cloud providers providing straightforward guidance on their shared responsibility models for security and compliance in cloud environments.

Read More

NEWS

Large enterprises struggle to protect critical network assets from cyberattacks and outages

Research conducted by Endace and VIB identifies the economic, resourcing, and management challenges that large enterprises face in protecting their networks.

Read More

New CISO research reveals perceptions on cloud native security and substantial progress in...
A new software platform aims to transform cybersecurity by allowing managers to monitor the whole...
New research from leading information security company Clearswift has shown that the education...
Malwarebytes has launched ThreatDown, the product family that protects IT-constrained organizations...
Bitglass, the Total Cloud Security company, has released its 2020 BYOD Report, which analyses...
Nexsan survey highlights divided opinions on cloud security and reliability.
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more