NEWS

Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More

NEWS

Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals in the UK, Benelux and Nordics, which reveal the latest data points and trends in cybersecurity.

Read More

NEWS

Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.

Read More

BLOG

Cloud encryption: bring your own key is no longer enough

Encryption key management systems are now essential for all companies needing to lockdown data in the cloud, says Matt Landrock, Executive Vice President, Cryptomathic.

Read More

Knowledge-based identification may be the preferred way to authenticate online, but for how...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining...
A new remote workforce study from CyberArk has found that the majority of UK employees feel more...
CyberArk has introduced CyberArk Cloud Entitlements Manager, the industry’s first...
New global survey of 450 IT and security professionals reveals the full impact that the pandemic...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more