NEWS

Cymulate bolsters Proactive Cybersecurity Exposure Management with Advanced Analytics

New dynamic reporting provides faster intelligence for making data-driven decisions and reducing cyber risk.

Read More

NEWS

CrowdStrike introduces AI-powered Indicators of Attack

Trained on the world's richest threat intelligence, new detection and response capabilities proactively protect organizations against emerging adversary techniques.

Read More

NEWS

Industry’s 'first' true shift-left API security solution

Checkmarx has introduced Checkmarx API Security, the first true “shift-left” API security solution. Building on the launch of Checkmarx Fusion, which prioritizes and correlates vulnerability data from across different AppSec engines, Checkmarx API Security is delivered as part of the industry-leading application security platform Checkmarx One. The developer workflow-oriented solution inventories even shadow and zombie APIs as part of the most comprehensive inventory and remediation solution available to secure the entire API lifecycle.

Read More

NEWS

Lumen stops 1.06 Tbps DDoS attack in the company's largest mitigation to date

Intended victim experienced no downtime despite attacker's persistence.

Read More

NEWS

SMBs reach a cybersecurity tipping point

ConnectWise has published the 2022 findings of its annual State of SMB Cybersecurity report, revealing that the growing number of attacks are fueling investment in cybersecurity, particularly with managed service providers (MSPs). Key findings show nearly three-quarters (73%) of report respondents are in agreement that their organisation has reached a tipping point where cybersecurity concerns demand action.

Read More

NEWS

Shortcut files delivering malware

HP Wolf Security report highlights the latest techniques and phishing lures targeting employees and putting companies at risk.

Read More

Delivers enterprise-scale network metadata to data lakes without the complexity, constant tuning and scale limitation of open-source Zeek.
Intermedia releases its inaugural IT Confidence Index.
Pivot3’s expanded Intelligence Engine capabilities enable customers to streamline security and regulatory compliance across the edge, core and cloud.
Narrow gap between CEO, CIO and CISO roles shows no single executive function stepping up.
New feature can be initiated remotely and instantly, ensures data stored on tape is completely offline and secure, provides ultimate level of data security for cyber-resilient archives.
HackerOne has released The 2022 Attack Resistance Report that captures IT professionals’ assessments of their cyberattack readiness. The report reveals organizations face a significant gap between what they are able to protect and what they need to protect — coined the attack resistance gap.
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more